Learn More
The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these devices, and their remote connectivity, has brought a new level of efficiency into our lives. However, the security of these devices has come into question. While many may be secure, the sheer number creates an environment where(More)
Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and(More)
  • Geoffrey B. Saxe, Meghan M. Shaughnessy, +8 authors Julie McNamara
  • 2008
Mathematics Education (DiME, #406F766). The data presented, the statements made, and the views expressed are solely the responsibility of the authors. Appreciation is extended to the members of the Number lines In this article we consider the use of number lines for supporting students' understanding of fractions in the upper elementary and middle school(More)
  • 1