%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 33 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 32 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250714063448+00'00') /ModDate (D:20250714063448+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 8037 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 78.662 521.469 668.072 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 78.662 l 565.984 78.662 l 565.984 745.984 l f 45.266 746.734 m 45.266 78.662 l 46.016 78.662 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(CONSERVATION BY DRONE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(You've seen the videos on YouTube sweeping, breathtaking aerial shots capturing locations inaccessible to most )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(people. On Wednesday Rhino Africa released )] TJ ET 0.373 0.169 0.255 rg BT 246.101 626.431 Td /F4 9.0 Tf [(a video compiled with drone footage which shows the beauty of Africa)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 246.101 625.280 m 523.733 625.280 l S 0.153 0.153 0.153 rg BT 523.733 626.431 Td /F4 9.0 Tf [( and )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(the results are truly breathtaking.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(We can now gain access to previously remote areas with drones or UAV's \(unmanned aerial vehicles\) controlled by )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(remote or with the guidance of software and GPS. These flying robots were named "drones" because they resemble the )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(monotonoussound a male bee makes.)] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(Initially, drones weren't used for recreational activities. The first drones were utilised in the military, but today civilian )] TJ ET BT 61.016 542.497 Td /F4 9.0 Tf [(drones outnumber their military counterparts. It is estimated that, by 2015, over a million has been sold. Currently, they are )] TJ ET BT 61.016 531.508 Td /F4 9.0 Tf [(used in commercial, scientific, recreational, agricultural, and other applications,such as policing and surveillance, aerial )] TJ ET BT 61.016 520.519 Td /F4 9.0 Tf [(photography and conservation.)] TJ ET BT 61.016 500.530 Td /F4 9.0 Tf [(The idea of using UAVs for conservation was conceived by Lian Pin Koh, a conservation ecologist and Serge Wich, a )] TJ ET BT 61.016 489.541 Td /F4 9.0 Tf [(primate biologist in January 2011. It soon came to light that the available UAVs were too expensive for use in developing )] TJ ET BT 61.016 478.552 Td /F4 9.0 Tf [(countries where they were most needed. The only solution for Lian and Serge was to build their own more affordable )] TJ ET BT 61.016 467.563 Td /F4 9.0 Tf [(version, which ended up costingless than $2,000.)] TJ ET BT 61.016 447.574 Td /F4 9.0 Tf [(A year later, they tested their prototype inNorth Sumatra, Indonesia where the UAV flew over 30 missions and collected )] TJ ET BT 61.016 436.585 Td /F4 9.0 Tf [(thousands of high-quality aerial images and video footage of forests and wildlife. \()] TJ ET 0.373 0.169 0.255 rg BT 385.673 436.585 Td /F4 9.0 Tf [(https://conservationdrones.org/our-story/)] TJ ET 0.18 w 0 J [ ] 0 d 385.673 435.434 m 547.241 435.434 l S 0.153 0.153 0.153 rg BT 547.241 436.585 Td /F4 9.0 Tf [(\))] TJ ET BT 61.016 416.596 Td /F4 9.0 Tf [(As their research became known, the term "Conservation Drone" was coined and by 2012 the International Anti-Poaching )] TJ ET BT 61.016 405.607 Td /F4 9.0 Tf [(Foundation was using UAV's.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 385.618 Td /F4 9.0 Tf [(https://www.youtube.com/watch?v=FIrgjCNcDBI)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 384.467 m 252.824 384.467 l S 0.153 0.153 0.153 rg BT 61.016 365.629 Td /F4 9.0 Tf [(Worldwide organisations began using drones for conservation. In 2012 the WWF \(World Wide Fund for Nature\) started )] TJ ET BT 61.016 354.640 Td /F4 9.0 Tf [(using UAVs in Chitwan National Park, Nepal to monitor rhinos, tigers and elephants, but also to deter poachers.In the )] TJ ET BT 61.016 343.651 Td /F4 9.0 Tf [(same year, Google donated $5 million to the WWF to purchase conservation drones to fly over parts of Africa and Asia in )] TJ ET BT 61.016 332.662 Td /F4 9.0 Tf [(an attempt to help monitor and catch wildlife poachers.)] TJ ET BT 61.016 312.673 Td /F4 9.0 Tf [(Closer to home UAVs have been used successfully in the Kruger National Park against rhino poachers. In 2012 a UAV )] TJ ET BT 61.016 301.684 Td /F4 9.0 Tf [(was loaned to the South African National Parks authority by its manufacturer, Denel Dynamics.)] TJ ET BT 61.016 281.695 Td /F4 9.0 Tf [("In March 2014, the Howard G. Buffett Foundation announced a 255 million rand donation for a three-year initiative in )] TJ ET BT 61.016 270.706 Td /F4 9.0 Tf [(partnership with Nature Conservation Trust, South African National Parks \(SANParks\) and a South African public benefit )] TJ ET BT 61.016 259.717 Td /F4 9.0 Tf [(organisation \(PBO\) to combat poaching in Kruger National Park and test new anti-poaching technology. SANParks is )] TJ ET BT 61.016 248.728 Td /F4 9.0 Tf [(testing the use of drones and this year, the Foundation added a further 37.7 million rand to buy a helicopter for use in anti-)] TJ ET BT 61.016 237.739 Td /F4 9.0 Tf [(poaching operations." \()] TJ ET 0.373 0.169 0.255 rg BT 153.257 237.739 Td /F4 9.0 Tf [(https://www.savetherhino.org)] TJ ET 0.18 w 0 J [ ] 0 d 153.257 236.588 m 269.303 236.588 l S 0.153 0.153 0.153 rg BT 269.303 237.739 Td /F4 9.0 Tf [(\))] TJ ET BT 61.016 217.750 Td /F4 9.0 Tf [(In Namibia,the Sea Shepherd Conservation Society used this technology to monitor the annual seal cull and also to )] TJ ET BT 61.016 206.761 Td /F4 9.0 Tf [(combat rhino poaching inEtosha National Park.)] TJ ET BT 61.016 186.772 Td /F4 9.0 Tf [(Other uses for UAVs include aerial crop surveys,aerial photography,search and rescue,inspection of power lines and )] TJ ET BT 61.016 175.783 Td /F4 9.0 Tf [(pipelines,counting wildlife, delivering medical supplies to otherwise inaccessible regions, and detection of illegal hunting,)] TJ ET BT 61.016 164.794 Td /F4 9.0 Tf [(reconnaissance operations,cooperative environment monitoring, border patrol missions,convoy protection,forest fire )] TJ ET BT 61.016 153.805 Td /F4 9.0 Tf [(detection and monitoring, surveillance, coordinating humanitarian aid,plume tracking,land surveying, fire and large-)] TJ ET BT 61.016 142.816 Td /F4 9.0 Tf [(accident investigation,landslide measurement,illegal landfill detection,the construction industryand crowd monitoring. \()] TJ ET 0.373 0.169 0.255 rg BT 61.016 131.827 Td /F4 9.0 Tf [(Wikipedia)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 130.676 m 100.022 130.676 l S 0.153 0.153 0.153 rg BT 100.022 131.827 Td /F4 9.0 Tf [(\))] TJ ET BT 111.316 111.838 Td /F4 9.0 Tf [([SOURCES:)] TJ ET 0.373 0.169 0.255 rg BT 163.327 111.838 Td /F4 9.0 Tf [(https://en.wikipedia.org/wiki/Unmanned_aerial_vehicle)] TJ ET 0.18 w 0 J [ ] 0 d 163.327 110.687 m 379.408 110.687 l S 0.153 0.153 0.153 rg BT 379.408 111.838 Td /F4 9.0 Tf [(, )] TJ ET 0.373 0.169 0.255 rg BT 384.412 111.838 Td /F4 9.0 Tf [(https://conservationdrones.org/our-story/)] TJ ET 0.18 w 0 J [ ] 0 d 384.412 110.687 m 545.980 110.687 l S 0.153 0.153 0.153 rg BT 545.980 111.838 Td /F4 9.0 Tf [(, )] TJ ET 0.373 0.169 0.255 rg BT 346.909 100.849 Td /F4 9.0 Tf [(https://en.wikipedia.org/wiki/Conservation_Drones)] TJ ET 0.18 w 0 J [ ] 0 d 346.909 99.698 m 545.980 99.698 l S 0.153 0.153 0.153 rg BT 545.980 100.849 Td /F4 9.0 Tf [(, )] TJ ET 0.373 0.169 0.255 rg BT 159.799 89.860 Td /F4 9.0 Tf [(https://www.savetherhino.org/rhino_info/thorny_issues/the_use_of_drones_in_rhino_conservation)] TJ ET 0.18 w 0 J [ ] 0 d 159.799 88.709 m 548.482 88.709 l S 0.153 0.153 0.153 rg BT 548.482 89.860 Td /F4 9.0 Tf [(])] TJ ET q 225.000 0 0 72.000 61.016 490.277 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 246.1007 625.5982 523.7327 634.7557 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=fzBVPKU_qX8) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 490.2769 286.0157 562.2769 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2016/10/conservation-by-drone/drone-2/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 385.6727 435.7522 547.2407 444.9097 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://conservationdrones.org/our-story/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 384.7852 252.8237 393.9427 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=FIrgjCNcDBI) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 153.2567 236.9062 269.3027 246.0637 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://www.savetherhino.org/rhino_info/thorny_issues/the_use_of_drones_in_rhino_conservation) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 130.9942 100.0217 140.1517 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Unmanned_aerial_vehicle) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 163.3273 111.0052 379.4083 120.1627 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Unmanned_aerial_vehicle) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 384.4123 111.0052 545.9803 120.1627 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (https://conservationdrones.org/our-story/) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 346.9093 100.0162 545.9803 109.1737 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Conservation_Drones) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 159.7993 89.0272 548.4823 98.1847 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (https://www.savetherhino.org/rhino_info/thorny_issues/the_use_of_drones_in_rhino_conservation) >> endobj 32 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 96 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 8356>> stream ExifII*Ducky<+http://ns.adobe.com/xap/1.0/ Adobed       `,  !1"AQaq2#BRb3ѢCSr4d5!1AQaq"BRb# ?M@P( @P( @P( @P( @P(#rkqu Ր@\쥸M e?w$~o$sfe/~qc$_c;:)eu1Ǡ?l{eQѱ _ƷQzWE\R^iơbݘkhfSO祝 ?nl%WIb?2>}Iv?9p}IWFKzƠ3Ln# u>5EW!߬]yVQ .!)}OjZa5?tgxX+5PFH}0﫛++㓉PC ='jepѳOя~˖]?S&i}{Մw 4RxI5{ -F0 |31 ?ci "LMY?aJ 6k/[{b B! nvqס֨P( Ta`6 =]cmgKoD>C8.7YTZf򥍅H" #νׇ_Ic,12JnֵVu=UݬO9d9a`.14.}3sZ,EA8nZ67ޠ ën&+x?lS ?W$|:!x,r@?TeN)Ђ{#hGh6a RĤU"E=25-2EԱtP@;ĬNƺ2XԕyW+ͬ{xͿmZGٽ/#iq%$֚G v9] 7µ9%c/鶛KW9n5u5ΖPJ[50٫kͥFW%UF݋r]}AֹmvV!v[_CH!(>۠*:;kmgtwd@塔鯷B t4GeKkF1[C[JxԕT(1<_f4eXBG`:Ց21]*=+9i29QEI=NNzNc3)V u>:u[WY\+h[Cl鮨Hв]³z8F=]507bly6B8yR$[d :{+;8ao]0_,N~ua%o-N$ڲ@~xe76ӉA.|wicћw5{| p)d_Y+'/_LkOKDZb7-齜I;2<3W?־ݦkg+#*KQoe'v'VM|[xצꘌ^^oYF_g)itA"@Vjmf+i<i+vu^ r]u?GEmےaVbuvTWot?q&]=ۧ_[Z_d]9Y\켠u!FE#¯3v'kw!˫dK ,Ut>PIzv:_qK;q!:PPky1CH#5 Y2g4wr*G77xkWYV0cFٶxIO^mn'wi5rN?m;(j=(!VW:($\YklN<֡=Yat 2$}!6\;G|f~$nm4ܺD#nnܡ)A=o)y@*whH/ph| (3P( '#nՈX$Ƨٱ·;!bcQ1U*~USL'mMJm%6mGQ֓Yꖹc%ԉq]pVFOPC+X%?vI/``A@_yR5wrm#؝OégS\sѻ̣"F4꿱=ov|Dּ8b飜\]I%/+0}B(ԑ6ndsgq?F); =ʀ|=λgsK)7~{wWљXbSt/ոrnvweotonf.˾8щؚu+6w:T)M_ʉeXߨ$- cf߽4Bb838˯T嵸חmn$$U,N|uWyc,hc8H'#RF:B+SX}\soMYmdy-Lţ4 'YQuoetQw!ϻkxGys r5o%;QUʍU[k8#0.L@@ʫ//GM},esoOQv7py>b@5:mfYX೷mBToJ1y>>6k/0_Me+(/1Sס2^ߵ?RzruƟt?q,jg?ysY1"*UI/ w~B VmӧKCOpb֧De{7BN7<(lo,~B#o*N JKNf]Erޜ5t9kv7XRFX\8d*Z5=ۡGlΦ ro]%@P( SZZwM H@ cu''`#0馺{_0يP$1h ?eխFkI#QPP]ɱ?M}G3wǑ0|n׌Y?Kih7{Jh9.: uNd#p>u`,b`H$}7\kɉE׈q|Txc11Ep=m[yg2nwuVL3ֿ%PqLT[^E{H6KĠuk9f<{+kl`O G*B7WVHI3zeVYI̾ [̽x$0l(,y@m辩mscQYN$uFi#;e[;gZ mv\k-^tcڡZb=f4[\-sD?u<X#<&m˥qQym6KwEQ)@P(>d)lAA@P( @P( 㻷ɵ )aBnnH+WIubxԋqr.Wr/->iYUX[akh!Z [d_%X.^RF}nOg%qG L?$;MF+ 8/q{|o'vi-"dpYd]YOJLiܼ@ȷXG#n!;h=s׬EE~g֟i dC HmR:+o SF%bdM'FdF[ y-.t63rF:AW/4#ɴYKF8ST<:TCn{#fqWgCkc{X#)ꢙ++mŵ?2,qjUQZR=/ޮz؜;M? A@P( @P( @P(?U,uAA~8L7ylq Jn2@ iq՝z<}rc)ɭ٬1;Ay"ku-YέdFbtŗ<V,J޵.Rkg~g $]f)Lup,iԸG \n?-\cXCK4pNI}e]Z\xwVYlA.,A\d~0b)Ѵ:oFLw~ $o>:zUB{@U$6:鸝IWlj EE*(T A@P( @P( @PV{qB{ ۈziEӧ/R16*$kO_P1LKsVDŽJV'G;ޔM ޛk˧QօߙuFQ,FఽǪ9 L{L'VE A ɀk( l&t4dw9w%:"s? i$ *uzv;ZۋEisoU,7@$/r73t7}mn_{!B08t*`d-x#WkH9!:7HVOI:+;kRUñ}.y$[:f%9MG ʣ71p'{37 `3+MwkH[{&SAH` Fڱ(,hOƒٝ"?ŬaZq;١U4AـtP( @P( @P( O?lp*[@*˄!A=^9UBI'm^ uŮZKh#m56Wf:|,@(P|_[7E!g hS)<9K hU,1(JjJZ/{ߣv[[gNJ1kp`{2D]Ws>\;'t{.;yq[ɮ"a"HX+(>WZZc3[meX%x)~ OK7++1G*tTXlJ$[{ ,7w;y-+f]L=Iʡ^XrwSCYl=U?Qpq~[N9X+yf *.( WG |UB@P( @P( @P`о CzS"Ț8P]7S=(|o8W>k Ggpqmq|Bn3|ɬ#qUhB]Z_gr2K;w!&GX\'(I#ֆ95e_%_2oUq;=Yx=&&1VT몃`y59#Y%{yK*ck+m= w- yMK R8VdV>LWl7/ |%r鮄NĞ5*=K~x@+ZBt |i(8'$Oum>HIXmFl}rxoELޕ] CQ$~YoggyetK޽"OݣI8A$,]K.e-gl)PzrwM6:h:8/hLJ)h> endobj 34 0 obj << /Length 628 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 719.245 521.469 38.739 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 719.245 m 566.734 719.245 l 565.984 719.995 l 46.016 719.995 l f 566.734 757.984 m 566.734 719.245 l 565.984 719.995 l 565.984 757.984 l f 45.266 757.984 m 45.266 719.245 l 46.016 719.995 l 46.016 757.984 l f 61.016 734.995 m 550.984 734.995 l 550.984 735.745 l 61.016 735.745 l f 0.400 0.400 0.400 rg BT 61.016 749.193 Td /F2 9.0 Tf [(Posted in:General,Green IT,Research | | With 0 comments)] TJ ET endstream endobj xref 0 35 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000514 00000 n 0000000659 00000 n 0000008748 00000 n 0000008860 00000 n 0000008975 00000 n 0000009095 00000 n 0000009203 00000 n 0000009331 00000 n 0000009426 00000 n 0000009553 00000 n 0000009669 00000 n 0000009797 00000 n 0000009890 00000 n 0000010017 00000 n 0000010112 00000 n 0000010240 00000 n 0000010385 00000 n 0000010512 00000 n 0000010617 00000 n 0000010745 00000 n 0000010850 00000 n 0000010978 00000 n 0000011071 00000 n 0000011199 00000 n 0000011300 00000 n 0000011426 00000 n 0000011571 00000 n 0000020094 00000 n 0000020159 00000 n trailer << /Size 35 /Root 1 0 R /Info 5 0 R >> startxref 20839 %%EOF Research « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Research

Mobile technology survey reveals new trends

Friday, November 1st, 2013

Android and Apple mobile phones look likely to dominate share amongst students within a year while Blackberry’s share is dwindling rapidly. The picture has changed significantly since 2012:

mobile-phones

This is just one example of the results of a recent mobile technology survey conducted by the Information Technology division to track trends in students’ mobile devices. The purpose of these surveys (the first was conducted in September 2012) are to identify trends so that relevant university mobile services and strategies can be implemented in future. Understanding the mix of devices that students possess and how rapidly the picture is changing, is crucial for informed planning and decision-making.

Another unexpected trend is the slow penetration of tablets on campus. Since the vast majority of students have daily access to a laptop, ultrabook or notebook, the tablet seems to be an optional “third” device, which 47% of students can’t afford and 25% prefer not to use. Only 28% of respondents have a tablet, almost half of which are Apple iPads, closely followed by Android tablets. Students indicate that the take-up is likely to increase but accelerate slowly.

Unfortunately awareness of the national Student Technology Programme, which provides students with the opportunity to purchase heavily discounted tablets, laptops and notebooks, is also still lacking.

On the positive side students consistently rate mobile services and content related to learning and academic events and schedules as the most important. It is possible that as more learning content, including e-textbooks, becomes available via mobile devices, for offline consumption as well, that the penetration of tablets may accelerate.

mobile-content

More surveys will be conducted in the foreseeable future to discern trends and changes over time and students are encouraged to participate.

One lucky respondent, BComm student, Pierre-Etienne Rossouw, was the winner of an Incredible Connection gift voucher to the value of R1500.

2832 students out of 32266 invitees responded.

 

[PHOTO: Ralph Pina (director of development) with winner Pierre-Etienne Rossouw]

 

 

 

Moodle takes over from Vista & Blackboard

Friday, May 24th, 2013

From 2014 Stellenbosch University’s electronic learning management system will switch from Vista and Blackboard to Moodle, an  open source eLearning system. The switch to another system was necessitated from a change in the University’s strategy and shortcomings in the existing system that could not be corrected. The decision was based on a thorough investigation. Henceforth Moodle will be the standard eLearning system of the University.

A task team (Johann Kistner, drs Antoinette van der Merwe & JP Bosman and ms Marinda van Rooyen) facilitated the evaluation, including consulations with academic, administrative and support services staff. The success of systems, as well as the scale on which they were used by other universities, were also looked at. In the end a decision was made based on a set of predefined, weighed criteria. The following was taken into account:

  1. Off-campus access to the system must be reliable, because of the significant growth in the use of e-Learning Technology from outside campus:  service courses,      postgraduate modules, and students working from their homes.
  2. A reliable assessment component, because e-assessment is increasingly  used.
  3. A mobile interface that works on all equipment, due to the huge increase in the use of mobile devices (phones, tablets, laptops) to access the learning        management system.
  4. An accurate tracking system, because the tracking of students’ progress are critical for student success.
  5. Off-line functionality, which is very important in the (South) African context. The system must provide for students learning materials and other information to easily sync to their devices while on campus or via the network, and then to work at home without having to be online all the time.
  6. A more flexible licensing model, because community involvement and working with schools and other universities, especially on the African continent (e.g. in the CHEC courses and schools support) means that restrictive license agreements is not sustainable.

On a practical level this means that Moodle will be used for all modules from January and Vista and Blackboard will only be available for 2013 modules until March 2014. (until after the  last exam opportunity)

The short time span before implementation is planned presents substantial challenges for lecturers to migrate information in time and also for IT to ensure that servers are ready for the change. The project is currently being defined and the team is sticking to a tight time line to ensure that this goal will be achieved.

More information will also be communicated in future editions of Bits & Bytes.

Turnitin clips plagiarism’s wings

Friday, May 24th, 2013

Academic work at a university entails that the student be exposed to the ideas, written material and other intellectual and creative material of others. The intention with academic studies is precisely that the ideas of both the lecturers and the students will be shaped and polished by others. At the same time, students ought to go further than what was devised, written and created by others; he or she should critically evaluate it, provide new and original input or syntheses, and apply these to contemporary and local studies of problems. This is where academic activity becomes satisfying at university level.

Naturally, lecturers can only evaluate the contribution of their students if the contributions of others are clearly distinguished. This takes place through acknowledged systems or the process of acknowledgement and referencing. If these conventions are not adhered to and the required recognition is not given, the basis of the academic work at a university is undermined. Plagiarism is committed when someone else’s work (words, ideas, creations) are taken over and passed off as the writer’s own.

The university uses Turnitin to test plagiarism. Turnitin integrates with the Learning Management System (Webstudies or Ematies). (See more information below) Assignment links are created within the LMS which students use to upload their assignments to. The assignments submitted by students are stored in a database used to check for plagiarism. This prevents one student from using another student’s paper, by identifying matching text between papers. Assignments are also be checked against web pages, books, newspapers and available journals on the net.

The University aims to ensure that mechanisms are in place that will enable lecturers to promote academic integrity and to eliminate plagiarism. The most successful approaches to dealing with student instances of plagiarism allow for a ‘developmental approach’, which implies that cases of plagiarism – with the exception of serious cases – be used as opportunities to instruct the guilty persons as to what is expected and how to handle information. In addition, such a student could be directed to redo the assignment.

For more information on the university’s the Interim Guidelines for dealing with Plagiarism, please visit the CTL website: http://stbweb02.stb.sun.ac.za/ctl/policies.html

Article compilied from the Interim approach to dealing with plagiarism policy by Marinda van Rooyen

 TURNITIN/WebStudies official website

TURNITIN Logon problems & Help

–          If you can’t log in to WebSTudies or Blackboard, Go to www.sun.ac.za/useradm  and change your password.

–          Any other WebSTudies or Blackboard related queries (modules not showing etc.), send an e-mail to WebStudies or Samuel Morris or
call+27(0)21 808-2443

 

 

DRM – a Central African country?

Friday, April 26th, 2013

The abbreviation sounds like a reference to a Central African country and although DRM has to do with management, it’s about managing something less tangible and with less defined borders.

With the increasing amount of digital content flooding our world, whether it’s music, e-books or video it has become necessary for companies to protect their property by setting certain measures in place. But what is DRM?

We’ve  found the following definition and description on one of our favorite websites –

“Digital Rights Management (DRM) is a type of access control technique used by copyright holders, publishers, and hardware manufacturers to limit the use, manipulation, and distribution of digital content after the initial sale of that content.

Examples of DRM include the encryption of digital video (on DVD and Blu-ray discs) to prevent the purchaser from ripping the content off the disc, locking ebooks to the account with which they were purchased (thus you can read your Amazon-supplied ebook on your Kindle, transfer it to your Kindle app on your iPad, or read in on Amazon.com, but you cannot give that book to a friend or transfer it to your Barnes and Noble Nook), and the restriction of downloaded gaming content to the console or computer with which it was downloaded (you cannot simply copy your Xbox Live Arcade games from your console to the consoles of all your friends).

While publishing and content companies maintain that DRM is necessary to protect their intellectual property and fight piracy, many annoyed consumers note that content locked down by DRM is still widely distributed by pirates yet paying customers are stuck with the frustration of dealing with DRM systems including locked hardware, content they cannot transfer between other devices, and other such inconveniences.”

Today is also World Intellectual Property Day with various activities presented by Stellenbosch University. More info. 

 

 

(SOURCE: www.howtogeek.com)

Access to Library e-resources changing shortly

Friday, May 25th, 2012

Until now free internet access to the US Library Services’ subscription based electronic resources were managed by a setting in users’ browsers.

This setting, known as the PAC file, consists of a list of the electronic resources the library provides free internet access to. It mainly consists of agent and subscription e-resources, although, in some cases, exceptions were made to make subject specific resources available for free. Due to the ongoing decrease in internet costs this privilege will be suspended from 1 July 2012.

Due to the increase of e-resources on the internet, as well as the recent upgrade of the campus firewall and SANReN connection, the browser setting is no longer a practical method to gain access to free internet. In future free access to e-resources will only be available on the library’s website. Users can create new bookmarks from the Library’s e-database list  in their browsers if they still need access.

This new method is applicable to desktop computers, as well as laptops on and off campus. From July 2012 users no longer have to change the configuration of their browser on their laptops when they switch between working at home or the office.

Take note that you do need to use your Inetkey at all times for access to these free e-resources when working on the campus network.

These changes will be applicable from 1 July 2012.

Article supplied by Wouter Klapwijk, Information Technology, Library and Information Service

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.