Minnov8

Showcasing Minnesota Technology Innovation

  • Home
  • Minnov8 Gang Podcast
    • Complete Podcast Posts
    • MP3 Archive of All Episodes
  • Blog
  • About
  • Contact

Minnesota is #1 for Internet Usage

November 17, 2016 By Steve Borsch

woman-internetOur friend over at Blandin on Broadband, Ann Treacy, had this post about Minnesota ranking #1 in internet usage:

Entrepreneur Magazine just called out Minnesota as the state with the highest rate of Internet usage…

According to data from the U.S. Department of Commerce’s National Telecommunications and Information Administration, you won’t find the most connected people on the coasts, or deep in the heart of Texas, but largely in the Midwest. Just under three-quarters of U.S. households were online in 2015. But the most connected state isn’t located on one of the coasts — it’s in the heart of the Midwest…

In 2015, 83.1 percent of Minnesotans, or 4,307,850 households, used the internet. In 1998, 1,889,017 (then 41.5 percent) households were online.

It’s great to see Minnesota rank highly! However before we drink too much champagne, there are a couple of caveats – they are talking about Internet usage, not necessarily broadband. And they are talking about use anywhere (library, work, coffee shop, school), not necessarily home. We come in third for home access with 76.2 percent, which is good but still Internet access – not necessarily broadband.

We agree with Ann that it’s good to see Minnesota ranked so highly but our broadband is still lacking state-wide. Read more from Ann and follow Blandin on Broadband.

Filed Under: Internet & Society Tagged With: Internet

Steve’s Security Tip of the Week – Use Extreme Caution With Your Debit Card

December 20, 2013 By Steve Borsch

debit-card3On December 13, 2013 the security researcher, Brian Krebs, broke a story on his blog which turned in to an admission by Target that they had experienced a 40 million credit and debit card security breach which occurred from Black Friday through December 15th.

(Update from Krebs 12/20/13: Cards Stolen in Target Breach Flood Underground Markets)

In a KARE11/USA Today article released just after lunch today, apparently there is “no indication” that debit card personal information numbers (PIN) were part of the breach:

Stolen information from some 40 million credit and debit cards used in its stores from Black Friday through Dec. 15 included names, credit or debit card numbers, card expiration dates and the CVV data on the magnetic stripe on cards, the retailer said.

Target spokesman Eric Hausman confirmed, however, it has “no indication that debit card PINs were impacted.”

Target’s own credit card data, REDcard, was breached but so were all bank credit or debit cards used by shoppers. The big red flag for my family and me in early news reports was the realization that we almost exclusively use debit cards for our retail purchases. Though ours are backed by Visa and Wells Fargo policies (which dramatically limit our exposure) as you’ll see the personal risk and liability for using a debit card over a credit card is MUCH higher!

Though little is known about the exact nature of the Target breach as I write this post, Target’s statement about there being “no indication” that PIN numbers weren’t breached is weak assurance that we Target-shopper’s debit card PIN numbers were not stolen. Some commentary I’ve read suspect code was inserted in to the Target network and the crooks were able to intercept the data on the magnetic strip when shoppers used their cards at a Target point-of-sale (POS) terminal. Capturing this information would then enable crooks to place that data on a counterfeit card or use it for online shopping (Update: As Krebs points out in the last paragraph of his updated post, there are two CVV numbers: one on the magnetic strip and one printed on the back of the card itself. Online retailers use the “CVV2” printed number to verify that you are, in fact, most likely holding the card in your hand. Target has confirmed that the CVV1′s were stolen but the CVV2s were not).

“No indication” of a PIN breach or not, the big problem for we debit card users is that our PIN numbers could have been intercepted from that same POS terminal thus enabling thieves to use it for direct purchases or even ATM withdrawals, according to Krebs:

The type of data stolen — also known as “track data” — allows crooks to create counterfeit cards by encoding the information onto any card with a magnetic stripe. If the thieves also were able to intercept PIN data for debit transactions, they would theoretically be able to reproduce stolen debit cards and use them to withdraw cash from ATMs.

ABOUT DEBIT CARDS
debit-card2Most of us know that it is simple to report fraud on a credit card, have your card reissued, and at most we’re at risk for $50 if we report it within 60 days. What most people do NOT know is that using a debit card could cause your bank account to be drained and end up with you needing to fight, potentially for months, to get your money returned in to your account.

Did you also know there are two types of debit cards? I didn’t and it turns out our debit cards from Wells Fargo can be used as either a credit or debit card (i.e., used with or without a PIN).

In February of this year ABC News had a good article on Why Using Debit Cards Can Be Dangerous which had these two key paragraphs that detailed the difference (my emphasis):

Unbeknownst to most people there are actually two different types of debit cards, deferred and direct. The deferred card – or signature-based – is similar to a credit card minus the credit. This card requires you to sign for the purchase and then the money will be debited from your checking account within two to three days. A direct – or PIN-based – debit card requires that you punch in your PIN number every time you buy something and the money is immediately withdrawn from your account.

When the consumer uses their personal identification number to make a purchase, the retailer usually pays a flat fee to the bank. However, when the purchaser opts to use their debit card as a credit card, which typically requires a signature, the retailer generally has to pay a percentage fee based on the amount of your purchase. Therefore, it is becoming more common for the retailers to encourage PIN-based transactions, and several are no longer accepting debit card purchases that require a signature at all.

Retailers pay billions in fees to credit card companies that back debit cards so they have a huge incentive to get us to use the direct (PIN-based) method at the register.

I stopped and thought about my own family’s debit card use and that many retailers we frequent do ask for a PIN to be entered in the terminal. Sometimes it is obvious how you can bypass this (so the retailer pays that fee and our PIN isn’t exposed), but sometimes it is not. Frankly I never paid much attention to it since I shop at reputable retailers (like, um, Target?) but I will in the future.

online-debit-card

HOW TO PROTECT YOURSELF
Should you just cut up your debit card and exclusively use a credit card going forward? Probably if you consider this example of what happens if your debit card is breached and used fraudulently. An implied warning was laid out well in this BankRate.com article about why using a debit card is fraught with peril and risk (my emphasis):

Debit cards are different. Debit cards may look identical to credit cards, but there’s one key difference. With credit cards, users who spot fraudulent charges on their bill can simply decline the charges and not pay the bill. On the other hand, debit cards draw money directly from your checking account, rather than from an intermediary such as a credit card company.

Because of that, even clear-cut cases of fraud where victims are protected from liability by consumer protection laws can cause significant hardship, says Frank Abagnale, a secure-document consultant in Washington, D.C.

He cites the example of the The TJX Companies Inc.’s T.J. Maxx data breach that exposed the payment information of thousands of customers in 2007. The incident resulted in $150 million in fraud losses, and much of it was pulled directly from customers’ bank accounts. While credit card users got their accounts straightened out and new cards in the mail within a few days, the case created major problems for debit card holders who waited an average of two to three months to get reimbursed, Abagnale says.

If you are going to use, or have to use, a debit card, BankRate also provided four transaction points where you should use extreme caution (or never, ever use) a debit card. NOTE: I added #5 since we travel frequently on business and #6 because of my own personal investigation with our bank:

ATM1) Independent ATMs – You run the risk of skimmers. While skimmers can be found on bank ATMs, they’re less likely because there are often security cameras in place.

2) Pay at the pump – Skimmers aren’t the only danger to your wallet. The gas station will put a big hold on your account that could cause your checks to bounce. If you must pay with debit at gas station, go inside and pay at the cashier.

3) When you’re buying online – Credit card is a much better option. If you don’t get your merchandise, you can do a chargeback during a 60-day window. Debit card amounts are immediately withdrawn from your account and you have to fight the merchant (and quite often your bank) to get your money back.

If it is a small or unknown merchant (e.g., on eBay or an Amazon affiliated merchant) good luck getting reimbursed. If someone has fraudulently used your credit card, you (or your credit card company) are likely to spot it before you get the statement. That means you are never out the money. You dispute the charge, subtract the disputed amount from your bill and let the credit card issuer worry about it. With a debit card, the stolen money may have already left your account. That means you have to dicker with your bank to get reimbursed. Some banks are quick and helpful in resolving these disputes. Others? Not so much.

4) At a restaurant – Because there is such high turnover of wait staff at restaurants, you don’t want a dishonest employee to get hold of your debit card or, hopefully, not run it through a pocket-sized credit card data skimmer (which stores your track data which can subsequently be used to counterfeit your card).

5) When traveling – Consider very seriously never using your debit card while traveling and specifically for booking and paying for your hotel or rental car. When using a debit card hotels and rental car companies place a “hold” on money in your account to ensure that you have sufficient funds to pay your bill when you check out. This held amount can typically be for double the amount of your stay (in case you stay longer or raid the minibar at the hotel) or some arbitrary amount in the thousands of dollars in the case of a rental car company (in case you damage the vehicle). Add to that the unknown number of merchants with which you will interact while traveling (and this varies by country, of course) and your risk could rise exponentially.

wellsfargologo6) Discover your bank’s debit card policies – One would think our bank, Wells Fargo (which is the 4th largest in the U.S.) would clearly spell out their debit card policies and how they protect us, right? Nope. It was startlingly obtuse and caused me to dig around alot…and I still didn’t get all my questions answered.

Calling Wells Fargo customer debit card support on Friday morning to replace my wife and my debit cards (just in case they were breached at Target) was a lengthy but easy process, the hard part was trying to find out what our bank’s policy was about when fraud should be reported. Some online articles say things like “most banks want you to report within two days” and others say “within 60 days“. Does prompt mean two days? 30 days? 60 days?

Logging in to our Wells Fargo account I was partially relieved to discover that, even though the bank still doesn’t define “promptly”, it does have some good information about how we are protected:

 Your Wells Fargo Debit Card comes with Zero Liability protection at no extra cost:

+ You won’t be liable for promptly reported unauthorized purchases or ATM transactions.

+ 24/7 monitoring: we help prevent unauthorized transactions by regularly reviewing your accounts for unusual activity.

+ Expert help is just a phone call away if your financial information is compromised or stolen. We’ll provide the information and assistance to help you get your account back on track.

+ Get real-time access to all transactions and balances to stay informed of all account activity. Your account information will not be shared with non-affiliated third-party marketers without your consent. 

+ Alerts: When you sign up for ATM/debit card alerts, it’s easy to stay informed about unusual activity on your Wells Fargo card. You can set up alerts for any of the following types of activity that may occur:Your purchase or ATM withdrawal is made from an international location. 

– Your card is used to make a purchase over the internet, by phone, or by mail order. 
– Your purchases exceed an amount designated by you.
– Your daily ATM withdrawals exceed an amount designated by you.

What does your debit card issuing bank offer? I would heartily recommend that, if you have a debit card and use it, you find out what your bank does for you if it is lost, stolen or its data compromised and the card used fraudently. Also find out if they offer alerts like Wells Fargo does (which I’ve now set up on all cards) since it can quickly notify you of any aberrations with your debit card usage.

WILL THERE SOON BE HIGHER FEES FOR USING A DEBIT CARD?
walletHere is one last data point for your consideration about whether or not to consider using a debit card as you shop going forward: debit cards carry higher risks for everyone so fees are likely to go up.

In the 2013 LexisNexis® True Cost of Fraud Study (PDF) it is pretty clear to me that we shoppers using debit cards simply cost retailers and financial institutions too much money (my emphasis):

Nearly all of the FI interviewed (financial institution executives surveyed) report that credit and debit cards continue to represent both the highest volume of fraud among their product lines and their greatest area of exposure. Some attributed 30%-40% of their overall fraud losses to fraud associated with their credit card and debit card products. Among the types of issues that they are experiencing at the POS, skimming and counterfeit cards continue to be a major problem. Card-Not-Present fraud is on the rise, and as consumers continue to use online and mobile retail channels, issuers are faced with potential for growing fraud exposure.

Visa’s™ April 19th, 2013 chargeback rule change is negatively impacting the success rates of chargebacks among some issuers. By only requiring that merchants provide evidence that the card in question was presented to the cashier, issuers are losing what may have previously been successful chargebacks. They are experiencing a rise in debit card charge backs, particularly through online channels, with charge back recovery rates of about 70% to 85% for most card products. However, many issuers reported lower success rates with debit cards compared to that of credit cards. 

Bottom line? We debit card-using shoppers cost retailers more if we don’t use our PIN numbers, fraud perpetrated with debit cards (and disputed charges causing chargebacks) are higher and that costs card-issuers more, and that the card-issuing companies are less successful recovering incorrectly disputed chargebacks so that costs them more too. The only likely outcome of this is higher fees for using debit cards.

Good luck and happy shopping!

spacer

FURTHER READING

  • Target Breach (Target holiday cyber breach hits 40 million payment cards)
    • Advice for leery Target customers from creditcards.com
    • Target security breach: Questions and answers
  • Debit vs. credit cards: Which is safer to swipe?
  • Don’t get ripped off by credit card skimming at gas pumps
  • Debit Cards and Identity Theft: Are You at Risk?
  • ATM Credit/Debit Card Skimmers
    • How does ATM skimming work?
    • Watch out for ATM ‘skimmers’
    • How to Spot (and Stop) ATM Skimmers
    • FBI Website: “Taking a Trip to the ATM?”
    • Consumerist posts about ATM skimmers (as well as Bluetooth gas pump skimmers!)

Filed Under: Internet & Society

What If We Stop Trusting The Internet?

October 11, 2013 By Steve Borsch

the_internetsWhat if the generic Top Level Domains (gTLDs) on the internet—like the ones we know and love like .com, .org, .net and so forth—collided with ones used by internal network names?

What if there were so many generic TLDs—so far there are 1,200 on the list with nearly 2,000 applicants—that your customers literally didn’t know what the hell to type in after the “.” when going to your website?

Mike O'Connor

Mike O’Connor

The push to add hundreds of gTLDs to the internet domain name space was an issue I had thought I understood. But it wasn’t until attending a talk by entrepreneur and smart guy Mike O’Connor last evening at U of MN’s Humphrey School of Public Affairs, that I began to understand the depth and breadth of the problem. The scope of the monetary incentives for the organization that runs the domain name system: ICANN, the Internet Corporation For Assigned Names and Numbers, is breathtaking too.

After Mike’s experiences co-founding the St. Paul internet service provider GoFast.net (PDF of an 1999 article on GoFast is here) and later running the Y2K program for the City of St. Paul staving off digital armageddon at the turn of the century. Then he became even more involved in various community adventures like when he was appointed by the governor to be on the Minnesota Ultra High Speed Broadband Task Force.

THE OPPORTUNITY
Turns out the push to add all of these gTLDs is pretty darn lucrative for ICANN. To sponsor a new gTLD isn’t cheap: the initial cost is $185,000 and the ongoing cost is $30,000 per year. Mike also surmised aloud that the fully burdened cost of sponsoring a new gTLD was closer to $500,000 and that was before promotion or marketing of it to drive awareness!

ICANN, a non-profit corporation, is poised to generate several hundred million dollars from adding all of these new gTLDs. Registrees and registrars (along with speculators) also stand to profit from the huge influx of new TLDs in the domain name system.

Of course, one could argue that new gTLDs also open up domain naming possibilities for the rest of us so we can stop dropping vowels in our names (e.g., Flickr; Tumblr, Socializr, etc.) and get exactly what we want.

But there is a looming problem that stands to change our level of trust when it comes to the internet.

THE PROBLEM
Mike laid out the problem in his talk and there is a lot more detail in this blog post. In essence the problem is:

The new TLDs may unexpectedly cause traffic that you’re expecting to go to your trusted internal networks (or your customer’s networks) to suddenly start being routed to an untrusted external network, one that you didn’t anticipate.  Donald Rumsfeld might call those external networks “unknown unknowns” — something untrusted that you don’t know about in advance.  The singular goal of this post is to let you know about this possibility in advance.  Here’s the key message:

If you have private networks that use TLDs on this list, best start planning for a future when those names (and any internal certificates using those names) are going to stop working right. 

You might think, “Ahh…that doesn’t really affect my company or me” but imagine you work for a corporation and are in a coffee shop . You open your laptop and launch your mail program. It tries to connect to your internal network to retrieve your email BUT YOU FORGOT to launch your VPN first. Oops.

Since the way seeking works when you have an internet connection, your laptop now attempts to find your company’s internal mail server on the wider internet. Since a new gTLD proposed is the same as internal as an internal name, it would be trivial for bad guys to spoof your program and you’d end up on an untrusted source on the wider internet. Here is part of a diagram Mike showed last evening that will give you a sense of some of the conflicts that are certain to arise:

new_gTLDs

Mike is not alone in his concern. This article at the Domain Industry Journal said in part:

“…the Association of National Advertisers (ANA), who represents dozens of well-known global brands including AT&T, eBay, IBM, Intel and Microsoft, to name just a few (see the full membership list here), blasted ICANN over “woefully inadequate” preparations for the impending roll out of new gTLDs.“

Add to that the simple confusion by consumers on what TLD to use. Many of our readers have “.net”, “.mn”, “.name” and other TLDs and often are frustrated because everyone puts in “.com” as a reflex. Imagine trying to remember one of literally hundreds of gTLDs like “.inc” or “.bank” or “.cloud” and so on. It’s a marketing budget nightmare and a scammers dream.

Add another issue: the inadvertent searching on a string in your web browser bar where you forgot to leave a space (e.g., “best company on the market in routers.Cisco is the best?” brings up a “routers.cisco” webpage instead of a page of Google or Bing results.

The comment period is over at ICANN so we’re along for the ride as users, developers, service providers or just interested observers. But if you are someone who manages or runs a private network with any potentially conflicting namespaces, take Mike’s advice: start planning now.

m8-spacer

To learn more about the controversy and concerns, here are a few links:

  • Mike’s Posts:
    • What if people stop trusting the ICANN root?
    • New gTLD Preparedness Project 
  • Verisign blasts ICANN for rushed generic top-level domain name rollout
  • Clashes, Collisions, Delays and Decisions: ICANN, NTIA, Verisign and ANA Weigh In on ‘Name Collisions’ and the Readiness of the New gTLD Program
  • The Technical Impact of New gTLDs: Are We Pushing on Regardless?
  • Verisign report: New gTLD Security, Stability, Resiliency Update: Exploratory Consumer Impact Analysis (PDF)
  • New gTLD Security Implications

Filed Under: Internet & Society, Internet & Web

What Hospitals Charge – Some $8k, Others $38k

May 8, 2013 By Steve Borsch

coinsOne of the reasons healthcare costs have spun out of control is that most consumers are blind to those costs. There isn’t an easy method of shopping for price and little-to-no incentive for doing so since most consumers only care about their small co-pay.

That all changes today with a “big data” play.

“Consumers on Wednesday will finally get some answers about one of modern life’s most persistent mysteries: how much medical care actually costs.

For the first time, the federal government will release the prices that hospitals charge for the 100 most common inpatient procedures. Until now, these charges have been closely held by facilities that see a competitive advantage in shielding their fees from competitors. What the numbers reveal is a health-care system with tremendous, seemingly random variation in the costs of services.”

— From the Washington Post

An interactive table at the Washington Post allowing a quick scan of each State's cost ranges for various procedures

An interactive table allowing a quick scan of each State’s cost ranges for various
procedures, this data display is one of cost ranges in Minnesota – Washington Post

As an owner of multiple small businesses there is no question that I keep a close eye on medical costs and have had personal experiences with the virtual impossibility of being able to shop for medical procedures by cost and efficacy. This is a fabulous first step in bringing a much-needed level of transparency to a healthcare industry which the U.S. spends more on than any other country in the world (and over 15% of our GDP too).

Filed Under: Internet & Society

The Singularity & Schools

July 17, 2012 By Steve Borsch

John W. Moravec, PhD

John W. Moravec, PhD

Even a casual observer can’t help but notice that the pace of change is accelerating, especially when it comes to technology. As we’ve joked here on the Minnov8 Gang in many previous shows, summers used to be pretty dead as far as topics were concerned and we had to pull ones out of our $^&% in order to have stuff to talk about every week.

But no more. Everything is moving faster and faster and, if Ray Kurzweil is right and The Singularity is Near, we need to listen to those who understand it and how it will impact us all — especially when it comes to our children and how they’re being educated to deal with exponential change.

One of the smart folks I read consistently is John Moravec, PhD, who is a, “…co-initiator of the Invisible Learning project; a co-founder of the Horizon Forum, a roundtable on the future of education at all levels; and am the editor of Education Futures (ISSN 1940-0934, http://www.educationfutures.com). I am also a faculty member in the Innovation Studies/Master of Liberal Studies graduate programs at the University of Minnesota.”

Vernor Vinge

Vernor Vinge

Dr. Moravec just wrote this post on his blog and embedded the audio below about his interview with Vernor Vinge [Wikipedia | website], a retired San Diego State University professor of mathematics. Vinge is better known as a five-time Hugo Award-winning science fiction author. His works include True Names, Fast Times at Fairmont High, and Rainbows End. Most importantly, his 1993 essay “The Coming Technological Singularity,” argues that accelerating technological change will bring about the end of the human era as we know it, and that the world will become so complex and foreign to human observers, it will be impossible to predict what will happen next.

[media url=”http://www.educationfutures.com/res/educationfutures_vernor_vinge_interview.mp3″ width=”400″ height=”25″ jwplayer=”controlbar=bottom”]

Filed Under: Edutech, Internet & Society

U of MN Paying Professors $500 to Review Open Textbooks

May 11, 2012 By Steve Borsch

The University of Minnesota launched an online catalog of open-source books last month and it’s just been revealed that the University will pay its professors $500 each time they post an evaluation of one of those books, according to this article on Inside HigherEd. Minnesota professors who have already adopted open-source texts will also receive $500, with all of the money coming from donor funds.

This is a brilliant move on the part of the University, especially when you consider the accelerating cost of a higher education as well as the increasing demand to for students to have textbooks they can view on multiple digital devices. With this payment motivator for professors, the University is clearly working to align the incentives of professors with those of a concerted effort on the part of higher education institutions to move toward an open textbook and open courseware.

Below is an infographic from OnlineSchools.org that will give you a glimpse in to the drivers behind the open textbook and open source books movement.

…  [Read More…]

Filed Under: Edutech, Internet & Society

MN Attorney General on Cramming Scamming

February 3, 2012 By Steve Borsch

Here is a followup to the post, “Mobile Text Message “Cramming” Scam” since I’ve received a response, embedded below, from an assistant with the State of Minnesota Attorney General’s office.

The AG’s letter below had four key responses:

  1. Yes, I was a “victim” of cramming and it is an old scam, with players in the game like the Gambino crime family in the late 1990s
  2. Our MN AG, Lori Swanson, is very concerned about these practices. What I did not know is that Attorney General Swanson, alongside Senator Amy Klobuchar, is already going after this category, albeit it appears to be only landline cramming and not mobile cramming, the latter an arguably bigger problem (WCCO story from January 7th here)
  3. Minnesota law provides some protection ONLY FOR LANDLINE CRAMMING and NOTHING FOR MOBILE
  4. In addition to the MN AG’s office, the Federal Trade Commission and Federal Communications Commission take complaints, and I was encouraged to file mine with them.

Visibility is what matters and Congress will only take action if enough consumers scream about this theft to them. That’s why I was so pleased to see a story on WCCO about mobile cramming (aired on February 1st) so they are paying attention.

Hats off to the journalists at WCCO for covering this story. As more and more of us get online with mobile phones — and our kids get them and respond to who-knows-what online — we need to scrutinize our cell phone bills and most people aren’t savvy enough to even know what’s going on with scams like these.

The wireless companies and scammers economic interests are aligned so there is little incentive for AT&T, Verizon, TMobile, Sprint and others to stop this practice of stealing from all of us. Congress needs to take action…now.

…  [Read More…]

Filed Under: Internet & Society, Mobile Technology

Student Led Technology Conference

January 13, 2012 By Steve Borsch

Inver Grove Heights Community Schools has an upcoming event that seems so delightful that I had to bring it to you. It’s likely you know of someone who would really enjoy being enlightened about technology by a bunch of students, or perhaps you’d like to attend too and see how these kids have learned to use all the technology this district uses (you can get a sense in this highlights video).

A guy from the Inver Grove Heights Community Schools Office of Communications, Johnny Germscheid, reached out to us here at Minnov8 to tell us about the event. Its focus is about technology, education and breaking down the communication barrier between children and adults. I’m guessing there will be a lot of learning occurring on both sides (student-as-teacher and adult-as-student).

Students in grades K-12 will be teaching adults how to use iPads, iPods, and other devices and software programs. Conference highlights include:

  • Produce and publish an eBook using rich multimedia content.
  • Create a digital scrapbook to capture family memories.
  • Design a webpage or blog to share your story on the web.
  • Find out how to set up and manage your own social networking profile.
  • Collaborate electronically to edit documents in a more efficient manner.
  • Compose original songs to add flavor to your movies.
  • Learn how to get the most out of that new iPad.

This is the second year Inver Grove Heights Community Schools has offered this Student Led Technology Conference. Turns out the Inver Grove Heights school district (ISD 199) was nationally recognized in Washington DC by the Consortium of School Networking (CoSN) this winter for this innovative concept.

The conference is free and open to anyone in the metro, or our entire State for that matter. To check out details about the conference, which takes place on Saturday, February 25th from 8:30am until Noon, visit the event mini-site here.

Filed Under: Edutech, Internet & Society

3M Company supports SOPA

December 23, 2011 By Steve Borsch

More than 400 organizations have publicly expressed support of the contentious Stop Online Piracy Act (SOPA), or the passage of other similar anti-piracy legislation, and we were stunned to see that Minnesota-based 3M Company made the list of those organizations IN FAVOR OF the Stop Online Privacy Act (SOPA) (click that link to get a quick overview of what SOPA is and why you should care).

3M’s support for SOPA came to light in this post at Digital Trends. Viewing the list was enlightening, especially considering the somewhat confusing array of those in favor of legislation that has virtually the entire tech industry — and specifically cybersecurity, internet inventors and internet engineers — lined up against it and the Senate’s version, Protect IP Act.

While it would have been somewhat less stunning to see a list comprised mostly of media companies, those around them like their law firms, and other clueless organizations supporting this act, it seems to make no sense that a company like 3M would even get in to the discussion.

We have reached out to 3M for a response and will publish it if and when we receive it.

Filed Under: Internet & Society, Internet & Web

Walker Art Center’s Awesome New Website

December 8, 2011 By Steve Borsch

Walker Art Center new website (click for larger view)

Earlier this week I had a friend send me a Twitter DM saying, “Man…you MUST check out the new Walker Art Center website.” So I headed over there that evening and spent over an hour reading, poking around and seeing what they’d delivered.

To say I was impressed is an understatement: the design is fresh, exciting to view and the content compelling. The breadth and depth of coverage of art and design quickly shifted my mind toward a completely different place, one of consideration, thought and ideas instead of my typical focus on the tech “flipper-flappers” and “eye candy” of this new website they’d delivered.

Others agree. In his post at ArtInfo “Why the Walker’s new website is a big deal“, Tyler Green calls it a “game changer” since the Walker site is atypical for a museum, usually an informational site intended to lead visitors to the art institution’s building and its exhibits. Instead, argues Green, the site redefines how the Walker sees its role: as both a physical and as a virtual hub.

Walker Art executive director, Olga Viso, wrote this article about their new site, saying in part:

“As the Walker’s name signals, we’re a center: a hub that brings together various pursuits related to contemporary art, from presenting the visual, performing, and media arts of our time to publishing the latest scholarly research; collecting art objects and commissioning new works to hosting artist residencies and convening public discussions about art and ideas. Given these activities—and more importantly, our mission to investigate the questions that shape us and inspire us as individuals, cultures, and communities—I’m excited to introduce our new website, an online hub for ideas about contemporary art and culture, both inside the Walker and beyond.”

Talking about the why of launching such an ambitious site redesign, Viso said, “The intent of the new site is to make visible our role as a generative producer and purveyor of content and broadcast our voice in the landscape of contemporary culture.”

Any downsides or critique? Two, but the first is a biggie and the second not so much.

…  [Read More…]

Filed Under: Innovation, Internet & Society, Internet & Web

Next Page »

Search

Minnov8.com Is Now An Archive

As of April 2017, Minnov8 posts and podcasts are now an archive as this site is no longer actively published. Thanks to all of you who have been reading and listening since our founding in 2008!

Minnov8 Post Categories

Connect with Minnov8

  • Email
  • Facebook
  • Twitter
  • YouTube

Minnov8 Gang Podcast

Copyright © 2025 · Log in
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.