#Third-Party Tool Integration
Explore tagged Tumblr posts
Text
Enhancing Moodle™ Functionality with Custom Plugin Development
As online learning continues to expand, educational institutions and businesses seek innovative ways to improve their learning management systems (LMS) for a more engaging user experience. Moodle™ stands out as a robust, open-source LMS that provides extensive capabilities. However, with custom plugin development, Moodle™ can be tailored even further to meet specific needs, improve user engagement, and enhance functionality. In this article, we’ll explore the benefits of custom plugins for Moodle™, including how they can support branded app development, course management, data analytics, and more.
1. Why Custom Plugin Development for Moodle™?
Custom plugin development transforms Moodle™ from a general-purpose platform into a tailored solution, meeting unique organizational requirements. From enabling offline access to offering a user-friendly interface, custom plugins allow organizations to add or modify features to align perfectly with their needs. This can be particularly valuable for institutions aiming for a branded experience, as custom branding apps can showcase their brand identity within the learning platform.
2. Enhancing Course Management and User Engagement
Course management is at the core of any LMS, and Moodle™ is no exception. With custom plugins, organizations can streamline the course setup process, add new course formats, and even offer personalized learning paths. Plugins designed for course management also help instructors and admins manage large courses effectively, ensuring a smoother learning experience for students.
An optimized course management process leads to higher engagement and retention. Features like real-time communication plugins allow students and instructors to interact instantly, creating a collaborative learning environment. Adding plugins that support multi-device compatibility ensures that users can access course content seamlessly, whether they’re on a desktop, tablet, or smartphone.
3. Branded App Development for Moodle™
For organizations looking to create a unique identity, branded app development for Moodle™ offers a powerful solution. Through branded apps, institutions can provide learners with an app that not only matches their brand's look and feel but also offers all necessary Moodle™ functionalities. With Moodle™ software app development, businesses can ensure their platform reflects their brand’s values and aesthetics, fostering a stronger connection with learners.
By incorporating plugins that allow customizable features, branded apps can be fine-tuned to prioritize certain functionalities, like quick access to course content or communication tools. Custom plugins also help optimize the app for performance and usability, resulting in a superior user experience.
4. Offline Access and Multi-Device Compatibility
One of the common challenges in e-learning is ensuring that users have access to content regardless of their internet connection or device. With custom plugins, Moodle™ can be equipped to support offline access, allowing users to download content for later use. This functionality is particularly beneficial for users in remote areas or for students who need flexibility in accessing learning materials.
Furthermore, multi-device compatibility is essential in today’s mobile-first world. Custom plugins can ensure Moodle™ functions seamlessly across different devices, from desktops to smartphones, enhancing accessibility for all users.
5. Improving User Experience with a User-Friendly Interface
A user-friendly interface is key to keeping learners engaged. Custom plugins can be developed to simplify navigation, making it easier for users to find what they need. Plugins focused on creating a user-friendly interface can transform Moodle™ by optimizing the layout, reducing clutter, and adding visual cues that improve usability.
6. Strengthening Security and Privacy
Security and privacy are critical considerations in any online learning platform. Custom plugins can be designed to enhance security and privacy features in Moodle™, ensuring that user data is protected. From additional login verification methods to restricted access for sensitive information, plugins can bolster the security framework of Moodle™, building trust with users.
7. Leveraging Data Analytics for Informed Decision-Making
Custom plugins that offer data analytics are invaluable for tracking learner progress, identifying patterns, and making data-driven decisions. With data analytics plugins, institutions can gain insights into course performance, learner engagement, and completion rates. These insights can then guide improvements in course content and teaching methods, optimizing the learning experience.
8. Integration with Third-Party Tools
Another advantage of custom plugin development for Moodle™ is the ability to integrate with other tools and software. From integrating with communication platforms to data storage and CRM systems, integration with tools via plugins helps streamline processes and create a cohesive learning ecosystem. These integrations allow Moodle™ to work in harmony with other platforms, enhancing overall functionality and user convenience.
9. Regular Updates for Continuous Improvement
Custom plugins allow organizations to keep their Moodle™ platform up-to-date with the latest features. Regular updates to plugins ensure that Moodle™ remains compatible with new technologies and user expectations. Moreover, with custom plugins, organizations can adapt and evolve their LMS to address emerging trends in e-learning, providing learners with a modern and relevant experience.
Conclusion
Custom plugin development enhances Moodle™ functionality by tailoring it to meet specific needs. From branded app development to data analytics and security enhancements, custom plugins transform Moodle™ into a more versatile and powerful LMS. By adopting custom plugin development, organizations can create a unique, engaging, and effective learning platform that aligns with their branding and goals. Embracing these customized solutions ensures a user-centered, accessible, and future-ready LMS experience.
#Custom Plugin Development#Moodle™ Customization#Learning Management Systems (LMS)#Branded App Development#Course Management#User Engagement#Data Analytics#Security and Privacy in LMS#Offline Access in Moodle™#Multi-Device Compatibility#User-Friendly Interface#Third-Party Tool Integration#LMS Optimization#eLearning Solutions#Digital Transformation in Education#Educational Technology#Personalized Learning
0 notes
Text
At the California Institute of the Arts, it all started with a videoconference between the registrar’s office and a nonprofit.
One of the nonprofit’s representatives had enabled an AI note-taking tool from Read AI. At the end of the meeting, it emailed a summary to all attendees, said Allan Chen, the institute’s chief technology officer. They could have a copy of the notes, if they wanted — they just needed to create their own account.
Next thing Chen knew, Read AI’s bot had popped up inabout a dozen of his meetings over a one-week span. It was in one-on-one check-ins. Project meetings. “Everything.”
The spread “was very aggressive,” recalled Chen, who also serves as vice president for institute technology. And it “took us by surprise.”
The scenariounderscores a growing challenge for colleges: Tech adoption and experimentation among students, faculty, and staff — especially as it pertains to AI — are outpacing institutions’ governance of these technologies and may even violate their data-privacy and security policies.
That has been the case with note-taking tools from companies including Read AI, Otter.ai, and Fireflies.ai.They can integrate with platforms like Zoom, Google Meet, and Microsoft Teamsto provide live transcriptions, meeting summaries, audio and video recordings, and other services.
Higher-ed interest in these products isn’t surprising.For those bogged down with virtual rendezvouses, a tool that can ingest long, winding conversations and spit outkey takeaways and action items is alluring. These services can also aid people with disabilities, including those who are deaf.
But the tools can quickly propagate unchecked across a university. They can auto-join any virtual meetings on a user’s calendar — even if that person is not in attendance. And that’s a concern, administrators say, if it means third-party productsthat an institution hasn’t reviewedmay be capturing and analyzing personal information, proprietary material, or confidential communications.
“What keeps me up at night is the ability for individual users to do things that are very powerful, but they don’t realize what they’re doing,” Chen said. “You may not realize you’re opening a can of worms.“
The Chronicle documented both individual and universitywide instances of this trend. At Tidewater Community College, in Virginia, Heather Brown, an instructional designer, unwittingly gave Otter.ai’s tool access to her calendar, and it joined a Faculty Senate meeting she didn’t end up attending. “One of our [associate vice presidents] reached out to inform me,” she wrote in a message. “I was mortified!”
24K notes
·
View notes
Text
Integrating ColdFusion Applications with Third-Party SaaS Tools
#Integrating ColdFusion Applications with Third-Party SaaS Tools#ColdFusion Applications with Third-Party SaaS Tools
0 notes
Text
Shopify Plus Customization: How Third-Party Tools Enhance Your Store
Discover how integrating third-party tools with Shopify Plus can bring added flexibility and features to your online store. This guide covers essential integrations that improve store functions, from enhanced customer experience to efficient backend operations.
Learn about top third-party options for customizing everything from marketing automation to inventory management, helping your Shopify Plus store grow with features that fit your specific business needs.
0 notes
Note
Is it ethical to use Chat GPT or Grammarly for line editing purposes? I have a finished book, 100% written by me and line edited by me already--and I do hope to get it traditionally published. But I think it could benefit from a line edit from someone who isn't me, obviously, before querying. But line editing services run $3-4k for a 75k book, which is beyond my budget.
I was chatting with someone recently who self-publishes. They said they use Chat GPT Plus to actually train a model for their projects to line edit using instructions like (do not rewrite or rephrase for content /edit only for rhythm, clarity, tone, and pacing /preserve my voice, sentence structure, and story intent with precision). Those are a few inputs she used and she said it actually worked really well.
So in that case, is AI viewed in the same way you'd collaborate with a human editor? Or does that cross ethical boundaries in traditional publishing? Like say for instance AI rewords your sentence and maybe switches out for a stronger verb or adjective or a stronger metaphor--is using that crossing a line? And if I were to use it for that purpose, would I need to disclose that? I know AI is practically a swear word among authors and publishers right now, so I think even having to say "I used AI tools" might raise eyebrows and make an agent hesitant during the querying process. But obviously, I wouldn't lie if it needs to be disclosed... just not sure I even want to go there and risk having to worry about that. Thoughts? Am I fine? Overthinking it?
Thanks!
I gotta be honest, this question made me flinch so hard I'm surprised my face didn't turn inside out.
Feeding your original work into ChatGPT or a similar generative AI large language model -- which are WELL KNOWN FOR STEALING EVERYTHING THAT GETS PUT INTO THEM AND SPITTING OUT STOLEN MATERIAL-- feels like, idk, just a terrible idea. Letting that AI have ANY kind of control over your words and steal them feels like a terrible idea. Using any words that a literal plagiarism-bot might come up with for you feels like a terrible idea.
And ethical questions aside: AI is simply not good at writing fiction. It doesn't KNOW anything. You want to take its "advice" on your book? Come on. Get it together.
Better idea: Get a good critique group that can tell you if there are major plot holes, characters whose motivations are unclear, anything like that -- those are things that AI can't help you with, anyway. Then read Self-Editing for Fiction Writers -- that info combined with a bit of patience should stand you in good stead.
Finally, I do think that using spell-check/grammarly, either as you work or to check your work, is fine. It's not rewriting your work for you, it's just pointing out typos/mistakes/potential issues, and YOU, PERSONALLY, are going through each and every one to make the decision of how to fix any actual errors that might have snuck in there, and you, personally, are making the decision about when to use a "stronger" word or phrase or recast a sentence that it thinks might be unclear or when to stet for voice, etc. Yes, get rid of typos and real mistakes, by all means!
(And no, I don't think use of that kind of "spell-check/grammar-check" tool is a problem or anything that you need to "disclose" or feel weird about -- spell-check is like, integrated into most word processing software as a rule, it's ubiquitous and helpful, and it's different from feeding your work into some third-party AI thing!)
344 notes
·
View notes
Text
Amazon Alexa is a graduate of the Darth Vader MBA

Next Tuesday (Oct 31) at 10hPT, the Internet Archive is livestreaming my presentation on my recent book, The Internet Con.
If you own an Alexa, you might enjoy its integration with IFTTT, an easy scripting environment that lets you create your own little voice-controlled apps, like "start my Roomba" or "close the garage door." If so, tough shit, Amazon just nuked IFTTT for Alexa:
https://www.theverge.com/2023/10/25/23931463/ifttt-amazon-alexa-applets-ending-support-integration-automation
Amazon can do this because the Alexa's operating system sits behind a cryptographic lock, and any tool that bypasses that lock is a felony under Section 1201 of the DMCA, punishable by a 5-year prison sentence and a $500,000 fine. That means that it's literally a crime to provide a rival OS that lets users retain functionality that Amazon no longer supports.
This is the proverbial gun on the mantelpiece, a moral hazard and invitation to mischief that tempts Amazon executives to run a bait-and-switch con where they sell you a gadget with five features and then remotely kill-switch two of them. This is prime directive of the Darth Vader MBA: "I am altering the deal. Pray I don't alter it any further."
So many companies got their business-plan at the Darth Vader MBA. The ability to revoke features after the fact means that companies can fuck around, but never find out. Apple sold millions of tracks via iTunes with the promise of letting you stream them to any other device you owned. After a couple years of this, the company caught some heat from the record labels, so they just pushed an update that killed the feature:
https://memex.craphound.com/2004/10/30/apple-to-ipod-owners-eat-shit-and-die-updated/
That gun on the mantelpiece went off all the way back in 2004 and it turns out it was a starter-pistol. Pretty soon, everyone was getting in on the act. If you find an alert on your printer screen demanding that you install a "security update" there's a damned good chance that the "update" is designed to block you from using third-party ink cartridges in a printer that you (sorta) own:
https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer
Selling your Tesla? Have fun being poor. The upgrades you spent thousands of dollars on go up in a puff of smoke the minute you trade the car into the dealer, annihilating the resale value of your car at the speed of light:
https://pluralistic.net/2022/10/23/how-to-fix-cars-by-breaking-felony-contempt-of-business-model/
Telsa has to detect the ownership transfer first. But once a product is sufficiently cloud-based, they can destroy your property from a distance without any warning or intervention on your part. That's what Adobe did last year, when it literally stole the colors from your Photoshop files, in history's SaaSiest heist caper:
https://pluralistic.net/2022/10/28/fade-to-black/#trust-the-process
And yet, when we hear about remote killswitches in the news, it's most often as part of a PR blitz for their virtues. Russia's invasion of Ukraine kicked off a new genre of these PR pieces, celebrating the fact that a John Deere dealership was able to remotely brick looted tractors that had been removed to Chechnya:
https://pluralistic.net/2022/05/08/about-those-kill-switched-ukrainian-tractors/
Today, Deere's PR minions are pitching search-and-replace versions of this story about Israeli tractors that Hamas is said to have looted, which were also remotely bricked.
But the main use of this remote killswitch isn't confounding war-looters: it's preventing farmers from fixing their own tractors without paying rent to John Deere. An even bigger omission from this narrative is the fact that John Deere is objectively Very Bad At Security, which means that the world's fleet of critical agricultural equipment is one breach away from being rendered permanently inert:
https://pluralistic.net/2021/04/23/reputation-laundry/#deere-john
There are plenty of good and honorable people working at big companies, from Adobe to Apple to Deere to Tesla to Amazon. But those people have to convince their colleagues that they should do the right thing. Those debates weigh the expected gains from scammy, immoral behavior against the expected costs.
Without DMCA 1201, Amazon would have to worry that their decision to revoke IFTTT functionality would motivate customers to seek out alternative software for their Alexas. This is a big deal: once a customer learns how to de-Amazon their Alexa, Amazon might never recapture that customer. Such a switch wouldn't have to come from a scrappy startup or a hacker's DIY solution, either. Take away DMCA 1201 and Walmart could step up, offering an alternative Alexa software stack that let you switch your purchases away from Amazon.
Money talks, bullshit walks. In any boardroom argument about whether to shift value away from customers to the company, a credible argument about how the company will suffer a net loss as a result has a better chance of prevailing than an argument that's just about the ethics of such a course of action:
https://pluralistic.net/2023/07/28/microincentives-and-enshittification/
Inevitably, these killswitches are pitched as a paternalistic tool for protecting customers. An HP rep once told me that they push deceptive security updates to brick third-party ink cartridges so that printer owners aren't tricked into printing out cherished family photos with ink that fades over time. Apple insists that its ability to push iOS updates that revoke functionality is about keeping mobile users safe – not monopolizing repair:
https://pluralistic.net/2023/09/22/vin-locking/#thought-differently
John Deere's killswitches protect you from looters. Adobe's killswitches let them add valuable functionality to their products. Tesla? Well, Tesla at least is refreshingly honest: "We have a killswitch because fuck you, that's why."
These excuses ring hollow because they conspicuously omit the possibility that you could have the benefits without the harms. Like, your tractor could come with a killswitch that you could bypass, meaning you could brick it at a distance, and still fix it yourself. Same with your phone. Software updates that take away functionality you want can be mitigated with the ability to roll back those updates – and by giving users the ability to apply part of a patch, but not the whole patch.
Cloud computing and software as a service are a choice. "Local first" computing is possible, and desirable:
https://pluralistic.net/2023/08/03/there-is-no-cloud/#only-other-peoples-computers
The cheapest rhetorical trick of the tech sector is the "indivisibility gambit" – the idea that these prix-fixe menus could never be served a la carte. Wanna talk to your friends online? Sorry there's just no way to help you do that without spying on you:
https://pluralistic.net/2022/11/08/divisibility/#technognosticism
One important argument over smart-speakers was poisoned by this false dichotomy: the debate about accessibility and IoT gadgets. Every IoT privacy or revocation scandal would provoke blanket statements from technically savvy people like, "No one should ever use one of these." The replies would then swiftly follow: "That's an ableist statement: I rely on my automation because I have a disability and I would otherwise be reliant on a caregiver or have to go without."
But the excluded middle here is: "No one should use one of these because they are killswitched. This is especially bad when a smart speaker is an assistive technology, because those applications are too important to leave up to the whims of giant companies that might brick them or revoke their features due to their own commercial imperatives, callousness, or financial straits."
Like the problem with the "bionic eyes" that Second Sight bricked wasn't that they helped visually impaired people see – it was that they couldn't be operated without the company's ongoing support and consent:
https://spectrum.ieee.org/bionic-eye-obsolete
It's perfectly possible to imagine a bionic eye whose software can be maintained by third parties, whose parts and schematics are widely available. The challenge of making this assistive technology fail gracefully isn't technical – it's commercial.
We're meant to believe that no bionic eye company could survive unless they devise their assistive technology such that it fails catastrophically if the business goes under. But it turns out that a bionic eye company can't survive even if they are allowed to do this.
Even if you believe Milton Friedman's Big Lie that a company is legally obligated to "maximize shareholder value," not even Friedman says that you are legally obligated to maximize companies' shareholder value. The fact that a company can make more money by defrauding you by revoking or bricking the things you buy from them doesn't oblige you to stand up for their right to do this.
Indeed, all of this conduct is arguably illegal, under Section 5 of the FTC Act, which prohibits "unfair and deceptive business practices":
https://pluralistic.net/2023/01/10/the-courage-to-govern/#whos-in-charge
"No one should ever use a smart speaker" lacks nuance. "Anyone who uses a smart speaker should be insulated from unilateral revocations by the manufacturer, both through legal restrictions that bind the manufacturer, and legal rights that empower others to modify our devices to help us," is a much better formulation.
It's only in the land of the Darth Vader MBA that the deal is "take it or leave it." In a good world, we should be able to take the parts that work, and throw away the parts that don't.
(Image: Stock Catalog/https://www.quotecatalog.com, Sam Howzit; CC BY 2.0; modified)
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/10/26/hit-with-a-brick/#graceful-failure
#pluralistic#alexa#ifttt#criptech#disability#drm#revocation#nothing about us without us#futureproofing#graceful failure#darth vader MBA#enshittification
288 notes
·
View notes
Note
Can you give more detail of mini non amnesiac sdr2 dynamic between Makoto and Nagito and how they differ from the amnesia one
Good question! Let me see...
So, in the amnesia version, Nagito is initially coming at it from the perspective of a school mentor meeting his mentee and they both happen to be in a killing game. His vibe there is very much, "So here's the laundry room. People often forget coins in the washing machines. Are you thinking of killing anyone yet? Oh, don't use that dryer; it always takes two runs for it to get things dry."
He does believe that this bad situation will create a good outcome, and he is excited to see what the Ultimates will make of it, but he's not pushing too hard for this to be a despair that creates the greatest hope, because initially this just reads as a pretty normal kidnapping. It's not like SDR2, where everyone has been taken to a secluded island, they're all strangers, memory-wise he's pretty fresh off the news that he's sick, and reality is heightened in a number of ways that make it easy for him to think this is the time to turn coal into diamonds. He knows his classmates, he's spent a year at Hope's Peak, and he's honestly more curious about what happened to allow a killing game to be going on at Hope's Peak than invested in putting his finger on the scale.
After all, the building they're in is definitely Hope's Peak. Maybe this is a test from the faculty. He doesn't know what they're testing exactly, but he can't imagine the lucksters are meant to hog the spotlight. They should act natural and do their best to learn how to be of use.
That changes in Chapter 2, when they see the note that says Hope's Peak closed down a year ago. At that point, memory loss is on the table, and also Hope's Peak as an institution is contextually under threat. Monokuma said right in the beginning that he was doing this for "despair", but now Nagito knows it's probably not Hope's Peak using despair as a tool to make the Ultimates greater; the Ultimates are the delegates of Hope's Peak, against this third party. They need to beat Monokuma and whoever's behind him.
Unfortunately, in order to do that, he still believes they need to use the despair of the killing game as a means of strengthening their hope, so from then on it's Nagito in SDR2 mode trying to be a stepping stone for the participants while Makoto's insistence that that's not right gradually causes Nagito to realize that the hope he's been looking for has been right there all along.
Throughout that whole version of the AU, Nagito continues to treat Makoto as his mentee; the last thing Hope's Peak told him was to look out for his kouhai, and he will. Whatever else he's doing, he will still be taking Makoto under his wing. Makoto's a nice guy; it feels good to help him, anyway.
In the non-amnesia version, he goes into it personally knowing everyone involved except Izuru. He's been Makoto's mentor at school; Makoto just doesn't remember. He knows Makoto's a nice guy who's good at making friends. And he knows this is a hope vs. despair battle, being televised to the world. There is no period of figuring things out or deciding how to approach things; right away he's trying to instigate constantly. To that end, he's pretty dismissive of Makoto, kind of steamrolling his questions and using every interaction as an attempt to convince or trick him into doing something for the killing game.
The relationship forms despite Nagito's disinterest. Everyone has to take care of their tiny senpai, and Makoto is serious about making sure Nagito is comfortable and getting enough food. It goes against Nagito's vibe of despairful self-neglect, but Nagito finds himself really enjoying the attention. He doesn't identify Makoto's hope as such very quickly, because he's too busy treating Makoto as an undeserved indulgence on his own part to consciously notice things like his integrity and his endurance. He honestly might not think to consider Makoto hopeful until Makoto is seconds from being executed. Just a kind of helpless, "Wait, that was hope! It was him all along!"
23 notes
·
View notes
Text


Journeys: Great RPG Mechanics #RPGMechanics: Week Five
In Playing at the World Jon Peterson mentions the impact of the board game Outdoor Survival (1972). It influenced early D&D– framing the act of crossing wild distances as an adventure unto itself, with perils beyond monsters. This theme appeared in several early board games– traveling out into a blank map, filling it in, and dealing with random events (Source of the Nile, Magic Realm, The Mystic Wood). The third booklet of original Dungeons & Dragons, “The Underworld & Wilderness Adventures,” specifically references Outdoor Survival and using it in play.
So, while dungeons have always captured the imagination, travelling through great spans has always been a close-run second. The popularity of hex-crawls and point-crawls, moving through unknown space, illustrates something basic. There’s no functional difference between different spaces and locations within a game. A dungeon, in terms of motion through it, mechanically operates like a forest or a city. The party moves through a space and arrives at an event. There’s some description possibly of the passage, but functionally it is the same.
The difference lies in the trappings and mechanics: time, obstacles, physicality, travel resources, etc. There are some meta-considerations as well. I remember running a city-based campaign which had a set of maps I’d drawn of different neighborhoods and areas. I had a player complain that he wanted a traveling campaign, to see different things. I explained that the city was varied and interesting– going to other places and neighborhoods could be just as cool. We went back and forth as I tried to drill down on what he wanted.
It eventually came out that he wanted a game where his character could loot, destroy, and shit on folks and then move on. Having a game in a city meant he’d have to deal with people and potentially suffer consequences.
In any case, if time and distance function mechanically the same across different sizes and instances (dungeon, wilderness, city), how does a game differentiate? The most common tool has been random encounters– with chances varying based on the terrain. Different environments have different appearance rates. That’s an approach ubiquitous to early FRPGs. That might then be elaborated with guidelines for speed, exhaustion, weather, supply, and encumbrance. The level depends on how crunchy the game is. In fact these kinds of systems have been a hallmark of trad approaches.
So it was interesting to see a more modern, story-driven game take a swing at travel and work to integrate it into play. The One Ring (with the original subtitle of Adventures over the Edge of the Wild) aims for this. TOR has some trappings of the trad game, like Encumbrance but handled simply. It has the need for a map and the calculation of possible distance and travel time. Resolution here goes through setting route, judging distance, multiplying by terrain, and comparing that to speed. That generally determines the number of fatigue tests being made.
Those tests are made by the traveling companions, with each having a different role. We have the Guide (making decisions), Scout (setting up camp), Huntsman (finding food), Look-out Man (keeping watch). Journeys have a set procedure beyond fatigue tests with players carrying out their role and comparing it to a hazard target, with different events possible.
Forbidden Lands takes a page from TOR, echoing this procedure. It falls somewhere between Mutant: Year Zero’s zone exploration and TOR’s role system. In practice it feels a little more mechanical and wearing than a Tolkien-esque journey. Forbidden Land’s travel can be brutal– that’s a feature of the base game system. The land is supposed to be harsh, newly opened after a post-apocalyptic calamity. In that sense it works, but in play it can seem absolutely punishing for players who don’t expect it. I definitely want to explore travel in play– with something more than just an Undertake a Perilous Journey move. In theory I love the idea of a deep journey procedure, but neither TOR or FL exactly hit what I want. The former feels like too much calculation and too many rolls potentially and the latter like a procedure for beating down the player’s resources. I love the idea of Journey mechanics, but I want something which falls in the middle of those– offers interesting play, adds to the story, and feels like the sweeping grandeur of crossing great distances.
58 notes
·
View notes
Text
How Startups Can Benefit from Cloud App Development Services?
Cloud App Development Services
Startups often face the rising common challenges such as limited and short budgets, rapidly changing markets and its competition, and the need to scale quickly. To overcome these hurdles, many are turning to Cloud App Development as an innovative solution. Cloud-based applications provide startups with the flexibility, speed, and cost efficiency they need to grow rapidly and remain competitive.
Faster Time and Response towards Market -
Speed is everything for startups and new organizations. Cloud App Development enables and leads towards faster development cycles and quick deployment. With cloud platforms, developers can build and test features rapidly, allowing the startups to bring their products to market in a shorter timeframe.
Lower Costs and Reduced Infrastructure -
Traditional app development services and operations require upfront investment in hardware, servers, and maintenance. While the Cloud App Development eliminates this need and it demands. Startups can run applications on cloud infrastructure and only pay for the resources they use, significantly reducing overhead costs.
Scalability as You Grow -
Startups might begin with a small user base but can grow rapidly. Cloud-based apps are designed and crafted to scale easily. As traffic increases, resources can be expanded automatically without significant changes to the app architecture. This means startups don’t need to worry about outgrowing their tech.
Enhanced Collaboration -
Cloud platforms and its features enable real-time collaboration among team members and present teams, regardless of their location and area. Whether developers, designers, or business stakeholders—everyone can work together more efficiently using cloud tools, which is crucial for agile startup teams.
Strong Security and Data Backup -
Security is a top most concern, especially when handling the customer data and its system. Cloud service providers offer built-in security features, data encryption, and regular backups to keep up the data safe. This provides startups with peace of mind, eliminating the need to invest heavily in IT security.
Easy Integration with Other Services -
Cloud apps can be easily integrated with third-party tools and resources such as payment gateways, CRM systems or analytics platforms and mediums. This helps the startups to create a more complete and functional solution personalized and customized as per their common needs and demands.
Expert Cloud App Development Support:
Startups that want to make the most of cloud technologies often partner with experts. Companies like Suma Soft, IBM, and Cyntexa offer specialized Cloud App Development services tailored to startup needs—ensuring speed, security, and scalability from day one.
#it services#technology#saas#software#saas development company#saas technology#digital transformation
3 notes
·
View notes
Text
Enhancing Moodle™ Functionality with Custom Plugin Development
As online learning continues to expand, educational institutions and businesses seek innovative ways to improve their learning management systems (LMS) for a more engaging user experience. Moodle™ stands out as a robust, open-source LMS that provides extensive capabilities. However, with custom plugin development, Moodle™ can be tailored even further to meet specific needs, improve user engagement, and enhance functionality. In this article, we’ll explore the benefits of custom plugins for Moodle™, including how they can support branded app development, course management, data analytics, and more.
1. Why Custom Plugin Development for Moodle™?
Custom plugin development transforms Moodle™ from a general-purpose platform into a tailored solution, meeting unique organizational requirements. From enabling offline access to offering a user-friendly interface, custom plugins allow organizations to add or modify features to align perfectly with their needs. This can be particularly valuable for institutions aiming for a branded experience, as custom branding apps can showcase their brand identity within the learning platform.
2. Enhancing Course Management and User Engagement
Course management is at the core of any LMS, and Moodle™ is no exception. With custom plugins, organizations can streamline the course setup process, add new course formats, and even offer personalized learning paths. Plugins designed for course management also help instructors and admins manage large courses effectively, ensuring a smoother learning experience for students.
An optimized course management process leads to higher engagement and retention. Features like real-time communication plugins allow students and instructors to interact instantly, creating a collaborative learning environment. Adding plugins that support multi-device compatibility ensures that users can access course content seamlessly, whether they’re on a desktop, tablet, or smartphone.
3. Branded App Development for Moodle™
For organizations looking to create a unique identity, branded app development for Moodle™ offers a powerful solution. Through branded apps, institutions can provide learners with an app that not only matches their brand's look and feel but also offers all necessary Moodle™ functionalities. With Moodle™ software app development, businesses can ensure their platform reflects their brand’s values and aesthetics, fostering a stronger connection with learners.
By incorporating plugins that allow customizable features, branded apps can be fine-tuned to prioritize certain functionalities, like quick access to course content or communication tools. Custom plugins also help optimize the app for performance and usability, resulting in a superior user experience.
4. Offline Access and Multi-Device Compatibility
One of the common challenges in e-learning is ensuring that users have access to content regardless of their internet connection or device. With custom plugins, Moodle™ can be equipped to support offline access, allowing users to download content for later use. This functionality is particularly beneficial for users in remote areas or for students who need flexibility in accessing learning materials.
Furthermore, multi-device compatibility is essential in today’s mobile-first world. Custom plugins can ensure Moodle™ functions seamlessly across different devices, from desktops to smartphones, enhancing accessibility for all users.
5. Improving User Experience with a User-Friendly Interface
A user-friendly interface is key to keeping learners engaged. Custom plugins can be developed to simplify navigation, making it easier for users to find what they need. Plugins focused on creating a user-friendly interface can transform Moodle™ by optimizing the layout, reducing clutter, and adding visual cues that improve usability.
6. Strengthening Security and Privacy
Security and privacy are critical considerations in any online learning platform. Custom plugins can be designed to enhance security and privacy features in Moodle™, ensuring that user data is protected. From additional login verification methods to restricted access for sensitive information, plugins can bolster the security framework of Moodle™, building trust with users.
7. Leveraging Data Analytics for Informed Decision-Making
Custom plugins that offer data analytics are invaluable for tracking learner progress, identifying patterns, and making data-driven decisions. With data analytics plugins, institutions can gain insights into course performance, learner engagement, and completion rates. These insights can then guide improvements in course content and teaching methods, optimizing the learning experience.
8. Integration with Third-Party Tools
Another advantage of custom plugin development for Moodle™ is the ability to integrate with other tools and software. From integrating with communication platforms to data storage and CRM systems, integration with tools via plugins helps streamline processes and create a cohesive learning ecosystem. These integrations allow Moodle™ to work in harmony with other platforms, enhancing overall functionality and user convenience.
9. Regular Updates for Continuous Improvement
Custom plugins allow organizations to keep their Moodle™ platform up-to-date with the latest features. Regular updates to plugins ensure that Moodle™ remains compatible with new technologies and user expectations. Moreover, with custom plugins, organizations can adapt and evolve their LMS to address emerging trends in e-learning, providing learners with a modern and relevant experience.
Conclusion
Custom plugin development enhances Moodle™ functionality by tailoring it to meet specific needs. From branded app development to data analytics and security enhancements, custom plugins transform Moodle™ into a more versatile and powerful LMS. By adopting custom plugin development, organizations can create a unique, engaging, and effective learning platform that aligns with their branding and goals. Embracing these customized solutions ensures a user-centered, accessible, and future-ready LMS experience.
This article draft includes each keyword naturally and leaves a placeholder for the internal link to your website. Let me know if you need any adjustments or further customization!
#Custom Plugin Development#Moodle™ Customization#Learning Management Systems (LMS)#Branded App Development#Course Management#User Engagement#Data Analytics#Security and Privacy in LMS#Offline Access in Moodle™#Multi-Device Compatibility#User-Friendly Interface#Third-Party Tool Integration#LMS Optimization#eLearning Solutions#Digital Transformation in Education#Educational Technology#Personalized Learning
1 note
·
View note
Text
“There is a lot of non-specificity in the tech itself, and brands are pretty risk averse to avoid controversy, or even the appearance of controversy,” Krzysztof Franaszek founder of the Adalytics ad quality and transparency platform told 404 Media. “This may have unintended consequences where they basically defund or demonetize certain journalism.”
How all of this works in practice is pretty complicated. It’s not the case that sites like Jezebel have no ads on them. Programmatic ads work with an auction system where advertisers “bid” for placement against certain types of content. Many brand safety tools “pre-bid,” so news content that is deemed risky by adtech systems are likely to sell ads to lower-quality advertisers for rates that are much lower than brand safe content.
Franaszek’s research has claimed that words like “abortion,” “pro-choice,” “pro-life,” “wade,” “gay,” “transgender,” “sexual,” regularly show up on brand safety keyword blocklists, which four different industry experts told 404 Media are extensive, ever growing, and rarely updated. Integral Ad Science, one of the third-party companies that helps brands with brand safety ad suitability, said what Franaszek found was “not advertiser blocklists.” One expert who requested anonymity to talk about specifics, said that the names of towns where mass shootings occurred would sometimes be placed on advertiser blocklists then never removed. "
50 notes
·
View notes
Text
"Just weeks before the implosion of AllHere, an education technology company that had been showered with cash from venture capitalists and featured in glowing profiles by the business press, America’s second-largest school district was warned about problems with AllHere’s product.
As the eight-year-old startup rolled out Los Angeles Unified School District’s flashy new AI-driven chatbot — an animated sun named “Ed” that AllHere was hired to build for $6 million — a former company executive was sending emails to the district and others that Ed’s workings violated bedrock student data privacy principles.
Those emails were sent shortly before The 74 first reported last week that AllHere, with $12 million in investor capital, was in serious straits. A June 14 statement on the company’s website revealed a majority of its employees had been furloughed due to its “current financial position.” Company founder and CEO Joanna Smith-Griffin, a spokesperson for the Los Angeles district said, was no longer on the job.
Smith-Griffin and L.A. Superintendent Alberto Carvalho went on the road together this spring to unveil Ed at a series of high-profile ed tech conferences, with the schools chief dubbing it the nation’s first “personal assistant” for students and leaning hard into LAUSD’s place in the K-12 AI vanguard. He called Ed’s ability to know students “unprecedented in American public education” at the ASU+GSV conference in April.
Through an algorithm that analyzes troves of student information from multiple sources, the chatbot was designed to offer tailored responses to questions like “what grade does my child have in math?” The tool relies on vast amounts of students’ data, including their academic performance and special education accommodations, to function.
Meanwhile, Chris Whiteley, a former senior director of software engineering at AllHere who was laid off in April, had become a whistleblower. He told district officials, its independent inspector general’s office and state education officials that the tool processed student records in ways that likely ran afoul of L.A. Unified’s own data privacy rules and put sensitive information at risk of getting hacked. None of the agencies ever responded, Whiteley told The 74.
...
In order to provide individualized prompts on details like student attendance and demographics, the tool connects to several data sources, according to the contract, including Welligent, an online tool used to track students’ special education services. The document notes that Ed also interfaces with the Whole Child Integrated Data stored on Snowflake, a cloud storage company. Launched in 2019, the Whole Child platform serves as a central repository for LAUSD student data designed to streamline data analysis to help educators monitor students’ progress and personalize instruction.
Whiteley told officials the app included students’ personally identifiable information in all chatbot prompts, even in those where the data weren’t relevant. Prompts containing students’ personal information were also shared with other third-party companies unnecessarily, Whiteley alleges, and were processed on offshore servers. Seven out of eight Ed chatbot requests, he said, are sent to places like Japan, Sweden, the United Kingdom, France, Switzerland, Australia and Canada.
Taken together, he argued the company’s practices ran afoul of data minimization principles, a standard cybersecurity practice that maintains that apps should collect and process the least amount of personal information necessary to accomplish a specific task. Playing fast and loose with the data, he said, unnecessarily exposed students’ information to potential cyberattacks and data breaches and, in cases where the data were processed overseas, could subject it to foreign governments’ data access and surveillance rules.
Chatbot source code that Whiteley shared with The 74 outlines how prompts are processed on foreign servers by a Microsoft AI service that integrates with ChatGPT. The LAUSD chatbot is directed to serve as a “friendly, concise customer support agent” that replies “using simple language a third grader could understand.” When querying the simple prompt “Hello,” the chatbot provided the student’s grades, progress toward graduation and other personal information.
AllHere’s critical flaw, Whiteley said, is that senior executives “didn’t understand how to protect data.”
...
Earlier in the month, a second threat actor known as Satanic Cloud claimed it had access to tens of thousands of L.A. students’ sensitive information and had posted it for sale on Breach Forums for $1,000. In 2022, the district was victim to a massive ransomware attack that exposed reams of sensitive data, including thousands of students’ psychological evaluations, to the dark web.
With AllHere’s fate uncertain, Whiteley blasted the company’s leadership and protocols.
“Personally identifiable information should be considered acid in a company and you should only touch it if you have to because acid is dangerous,” he told The 74. “The errors that were made were so egregious around PII, you should not be in education if you don’t think PII is acid.”
Read the full article here:
https://www.the74million.org/article/whistleblower-l-a-schools-chatbot-misused-student-data-as-tech-co-crumbled/
17 notes
·
View notes
Text
The adoption of the euro in Bulgaria is not expected to cause fast loans to become more expensive, and borrowers already have the tools to track and understand how their loans will be repaid after the currency transition.
The Association for Responsible Non-Bank Lending has issued several recommendations for consumers. At the top of the list is a reminder to rely solely on the official exchange rate of the Bulgarian National Bank (BNB) when recalculating amounts, rather than trusting third-party or unofficial rates. Many non-bank lenders have already integrated automatic calculators into their systems, which allow borrowers to see how their loans will convert using the BNB's fixed rate.
Roughly one in four Bulgarians has taken out a fast loan at least once. However, the association does not anticipate a spike in borrowing. These loans are typically used for manageable short-term needs - home repairs, vacations, or electronics purchases - rather than major financial commitments.
Nikolay Tsvetanov, chairman of the association, emphasized on Nova TV that the cost of these loans is capped by the Consumer Protection Act, which ties the maximum cost to a percentage of the principal. This means the cost limit remains unchanged regardless of whether amounts are expressed in leva or euros.
He underlined that there’s no financial basis for lenders to increase interest rates simply because of the euro’s introduction. Should any company attempt to do so under false pretenses, it would be in violation of the law and subject to sanctions.
4 notes
·
View notes
Text
Why to migrate Opencart to Woocommerce?
Migrating from OpenCart to WooCommerce can offer a range of strategic advantages for businesses looking to scale, modernize, and optimize their online presence. WooCommerce, being a WordPress-based platform, provides a more user-friendly interface, making it easier for non-technical users to manage products, orders, and content. Its deep integration with WordPress also opens up a vast ecosystem of plugins, themes, and SEO tools that can significantly enhance site functionality and visibility. Compared to OpenCart, WooCommerce offers greater flexibility for customization, better support for content marketing, and more frequent updates driven by a large and active developer community. Additionally, WooCommerce is highly scalable and supported by a vast range of payment gateways, shipping options, and third-party integrations. For businesses focused on growth, user experience, and long-term sustainability, transitioning to WooCommerce is a strategic move that aligns with modern e-commerce trends and customer expectations.
3 notes
·
View notes
Text
Adobe Creative Cloud Update: Meet Creative Cloud Pro, Unlimited AI, and Third-Party Integrations!
Adobe’s new Creative Cloud Pro plan launches June 17, 2025, with enhanced generative AI tools, third-party model integration (like OpenAI and Google), and a price bump to CAD $91.99/month. Users get unlimited standard AI features, 4,000 monthly premium credits, and upcoming access to the Firefly mobile app. Adobe also promises strong data privacy.
More here.
Subscribe to the podcast on Spotify, Apple Podcasts, or Amazon Music.
Follow WE AND THE COLOR on Facebook I Twitter I Pinterest I YouTube I Instagram I Reddit I ChatGPT I Podcast
3 notes
·
View notes
Text
The end-to-end encrypted communication app WhatsApp, used by roughly 3 billion people around the world, will roll out cloud-based AI capabilities in the coming weeks that are designed to preserve WhatsApp’s defining security and privacy guarantees while offering users access to message summarization and composition tools.
Meta has been incorporating generative AI features across its services that are built on its open source large language model, Llama. And WhatsApp already incorporates a light blue circle that gives users access to the Meta AI assistant. But many users have balked at this addition, given that interactions with the AI assistant aren’t shielded from Meta the way end-to-end encrypted WhatsApp chats are. The new feature, dubbed Private Processing, is meant to address these concerns with what the company says is a carefully architected and purpose-built platform devoted to processing data for AI tasks without the information being accessible to Meta, WhatsApp, or any other party. While initial reviews by researchers of the scheme’s integrity have been positive, some note that the move toward AI features could ultimately put WhatsApp on a slippery slope.
“WhatsApp is targeted and looked at by lots of different researchers and threat actors. That means internally it has a well understood threat model,” says Meta security engineering director Chris Rohlf. “There's also an existing set of privacy expectations from users, so this wasn’t just about managing the expansion of that threat model and making sure the expectations for privacy and security were met—it was about careful consideration of the user experience and making this opt-in.”
End-to-end encrypted communications are only accessible to the sender and receiver, or the people in a group chat. The service provider, in this case WhatsApp and its parent company Meta, is boxed out by design and can’t access users’ messages or calls. This setup is incompatible with typical generative AI platforms that run large language models on cloud servers and need access to users’ requests and data for processing. The goal of Private Processing is to create an alternate framework through which the privacy and security guarantees of end-to-end encrypted communication can be upheld while incorporating AI.
Users opt into using WhatsApp’s AI features, and they can also prevent people they’re chatting with from using the AI features in shared communications by turning on a new WhatsApp control known as “Advanced Chat Privacy.”
“When the setting is on, you can block others from exporting chats, auto-downloading media to their phone, and using messages for AI features,” WhatsApp wrote in a blog post last week. Like disappearing messages, anyone in a chat can turn Advanced Chat Privacy on and off—which is recorded for all to see—so participants just need to be mindful of any adjustments.
Private Processing is built with special hardware that isolates sensitive data in a “Trusted Execution Environment,” a siloed, locked-down region of a processor. The system is built to process and retain data for the minimum amount of time possible and is designed grind to a halt and send alerts if it detects any tampering or adjustments. WhatsApp is already inviting third-party audits of different components of the system and will make it part of the Meta bug bounty program to encourage the security community to submit information about flaws and potential vulnerabilities. Meta also says that, ultimately, it plans to make the components of Private Processing open source, both for expanded verification of its security and privacy guarantees and to make it easier for others to build similar services.
Last year, Apple debuted a similar scheme, known as Private Cloud Compute, for its Apple Intelligence AI platform. And users can turn the service on in Apple’s end-to-end encrypted communication app, Messages, to generate message summaries and compose “Smart Reply” messages on both iPhones and Macs.
Looking at Private Cloud Compute and Private Processing side by side is like comparing, well, Apple(s) and oranges, though. Apple’s Private Cloud Compute underpins all of Apple Intelligence everywhere it can be applied. Private Processing, on the other hand, was purpose-built for WhatsApp and doesn’t underpin Meta’s AI features more broadly. Apple Intelligence is also designed to do as much AI processing as possible on-device and only send requests to the Private Cloud Compute infrastructure when necessary. Since such “on device” or “local” processing requires powerful hardware, Apple only designed Apple Intelligence to run at all on its recent generations of mobile hardware. Old iPhones and iPads will never support Apple Intelligence.
Apple is a manufacturer of high-end smartphones and other hardware, while Meta is a software company, and has about 3 billion users who have all types of smartphones, including old and low-end devices. Rohlf and Colin Clemmons, one of the Private Processing lead engineers, say that it wasn’t feasible to design AI features for WhatsApp that could run locally on the spectrum of devices WhatsApp serves. Instead, WhatsApp focused on designing Private Processing to be as unhelpful as possible to attackers if it were to be breached.
“The design is one of risk minimization,” Clemmons says. “We want to minimize the value of compromising the system.”
The whole effort raises a more basic question, though, about why a secure communication platform like WhatsApp needs to offer AI features at all. Meta is adamant, though, that users expect the features at this point and will go wherever they have to to get them.
“Many people want to use AI tools to help them when they are messaging,” WhatsApp head Will Cathcart told WIRED in an email. “We think building a private way to do that is important, because people shouldn’t have to switch to a less-private platform to have the functionality they need.”
“Any end-to-end encrypted system that uses off-device AI inference is going to be riskier than a pure end to end system. You’re sending data to a computer in a data center, and that machine sees your private texts,” says Matt Green, a Johns Hopkins cryptographer who previewed some of the privacy guarantees of Private Processing, but hasn’t audited the complete system. “I believe WhatsApp when they say that they’ve designed this to be as secure as possible, and I believe them when they say that they can’t read your texts. But I also think there are risks here. More private data will go off device, and the machines that process this data will be a target for hackers and nation state adversaries.”
WhatsApp says, too, that beyond basic AI features like text summarization and writing suggestions, Private Processing will hopefully create a foundation for expanding into more complicated and involved AI features in the future that involve processing, and potentially storing, more data.
As Green puts it, “Given all the crazy things people use secure messengers for, any and all of this will make the Private Processing computers into a very big target.”
3 notes
·
View notes