uri

The Feet That Buried Your Husband…




uri

Bishop John on Purity

Today Dr. Rossi interviews Bishop John (Abdalah) of the Antiochian Archdiocese on the subject of purity.




uri

Purity of Heart and Sexual Chastity

Dr. Rossi address issues of the purity of the heart and mind in relation to sexual chastity.




uri

Praying the Psalms During Nativity

Georgia Mamalakis joins us to talk about a group of women joined together over many miles to pray the Psalms during the Nativity Fast but also during Great Lent.




uri

The Little Church During Advent Season

Bobby Maddex interviews Caleb Shoemaker and Elissa Bjeletich, the authors of the Ancient Faith Publishing book Blueprints for the Little Church, about how to effectively lead your family through the Advent fast and the Feast of the Nativity.




uri

The Centurion

Fr. Pat examines each of the three players in the second of the "miracles of blessing" found in the Gospel of Matthew—the centurion, Jesus, and the servant.




uri

Purity of Heart

In this homily based upon Matthew 6:22-33, Fr. Pat looks at three things necessary for us to have purity of heart.




uri

Devout Centurion

The account of the devout centurion that appears in both Matthew and Luke, but not in Mark, and obviously it is Matthew's version that we are considering today. The centurion serves as a model, I believe, for how Christ our Lord is to be approached, unless Christ our Lord is to be approached as a figment of our own imagination or simply as a projection of what we want out of religion.




uri

Is Orthodoxy Anti-Intellectual? (Featuring Sister Vassa Larin)

This week we're responding to another viewer question. Does a love of theology and academic study somehow contradict the mysticism of the Faith? We approach God as complete human persons, and that includes our minds. Reading and studying theology can be a great thing, but it should also be a part of our larger life in Christ. God is more than an idea we think about: He's a person we encounter.




uri

A Church of Councils (featuring Metropolitan Savas of Pittsburgh)

The Church isn't run by a single person. Instead, we come together in councils to keep the Faith and guide the Church through challenges. From the Apostolic Council of Jerusalem (in the Book of Acts) through the upcoming Great and Holy Council, this spirit of togetherness opens us to the guidance of the Holy Spirit.




uri

Who Do You Say That I Am? (featuring Christian Gonzalez)

Christ asked His disciples something personal: "Who do you say that I am?" It's an invitation to do more than answer a question: He's asking us to share our relationship with Him. So who do you say that Christ is? And how is He active in your life? Share your answer and this video!




uri

So, What's Your Story? (featuring Christian Gonzalez)

Our lives are chapters in a greater story. What part are you playing: the all-star athlete, the Greek American, the top of your class? What about the disciple of Christ? This week, let's refocus our lives in God's story, the greater story of salvation.




uri

Why We Don't Hide Our Faith (featuring Sister Vassa Larin)

Faith is often treated as a secret, private thing. But if we really believe that we know the way to eternal life in Christ, would we really keep that hidden from others?




uri

'The son every mum would love to have' - Nadal, Federer & an enduring legacy

BBC tennis correspondent Russell Fuller on Rafael Nadal's enduring rivalry with Roger Federer and his legacy in the tennis world.




uri

The most important entrepreneurial lesson I've learned.

I've enjoyed recreational fishing since I was a kid. Over the years I've had the chance to fish and associate with some top anglers, and I've noticed something about them - they don't waste time in an unproductive location. If...




uri

Holding on to hope during India’s Covid disaster

The BBC's Nikita Mandhani reflects on her personal experience of the second wave in India.




uri

Highland tourist tax could raise £10m a year

Highland Council has proposed setting a 5% rate for its visitor levy.




uri

Could a new 113-mile trail spark a tourism boom in the south of Scotland?

Dozens of new tourist businesses are opening in the South of Scotland as visitors escape to the great outdoors.




uri

GST could see tourists go elsewhere - hotelier

A Guernsey hotel manager says introducing a GST would mean higher prices for customers.




uri

Guernsey tourism 'still below pre-Covid levels'

Figures show 137,691 fewer people visited the island in the summer compared to 2019.




uri

Tourism fears over public toilet closures

More than 30 public toilets in Ceredigion could close to cut costs.




uri

Wales' papers: Pay rise for councillors and tourism tax

A review of the front page stories from the daily and weekly newspapers in Wales.




uri

Who Needs Mourinho? - Plymouth Pain

Former Welsh international and commentator Dave Edwards joins Chris Wise and Andy Moon




uri

Sex worker guilty of luring man to fatal stabbing

Rebecca Moore, 25, is found guilty of her role in the murder of Sacad Ali in Sheffield on 9 March.




uri

Burial plot plan stolen during church safe heist

The Chapel and School Room church says the loss of the document will make it "harder to do burials".




uri

Fast & Furious star to turn on Hay's Christmas Lights

Discover how Hollywood star Luke Evans, who's also been in The Hobbit, is coming to Herefordshire.




uri

No surgery for Forsyth but injuries not clearing up for Canaries

Norwich midfielder Gabriel Forsyth will not need surgery on a knee injury but will be out for more than a month.




uri

Interview: Andrew Grill, Author of Digitally Curious

Last week we attended the launch of Andrew Grill’s latest book, Digitally Curious, held in conjunction with SAP Concur at the firm’s London office. In the book, the futurist, speaker, […]

The post Interview: Andrew Grill, Author of Digitally Curious appeared first on Tech Digest.




uri

Nouvelles formations en entrepreneuriat pour les traducteurs

 

J’ai récemment collaboré avec le CI3M en vue de créer une offre de formation en entrepreneuriat destinée aux traducteurs professionnels souhaitant s’installer ou développer leur activité.

 

Déclinée en trois programmes, elle est :

  • enseignée à distance ;
  • remboursable par le FIF PL ou d’autres organismes de financement et
  • intègre un suivi hebdomadaire personnalisé, afin d’adapter son contenu à vos besoins.

formation CRÉATION ET Développement de l'activité

Ce programme complet sur 8 semaines a pour objectif d’aider les traducteurs à préparer, lancer, gérer et développer leur activité professionnelle. Par le biais d’exercices pratiques et d’un accompagnement personnalisé (8 h de suivi pédagogique par téléphone), vous découvrirez comment : 

 

1. Faire le point sur votre connaissance du métier de traducteur et évaluer votre degré de préparation à l’exercer en tant qu’indépendant, pour mieux préparer la création de votre entreprise.

 

2. Promouvoir et vendre vos services en définissant votre positionnement, votre politique tarifaire et votre stratégie de communication, afin de prospecter, de vendre et d’assurer le suivi auprès de vos clients de manière efficace.

 

3. Gérer une entreprise de traduction, notamment respecter un code de déontologie, ainsi que les nombreuses obligations comptables, fiscales et légales qu’implique l’exercice en libéral. Pour réussir et accroître vos revenus d’activité, vous découvrirez aussi comment piloter votre entreprise et anticiper les changements pour mieux saisir les opportunités.


4. Prendre du recul pour assurer l’équilibre entre votre vie personnelle et professionnelle.

 

formation marketing

Ce module spécifique s’adresse aux traducteurs déjà installés ou à ceux qui veulent aller droit à l’essentiel pour identifier et fidéliser leurs clients.

 

Après un premier diagnostic, qui permettra de cibler le périmètre de l’étude de marché à réaliser afin de bâtir une stratégie de marketing solide, le suivi pédagogique, réparti sur trois semaines, vous permettra d’acquérir les méthodes et les outils nécessaires pour vendre plus et mieux.

 

formation gestion et pilotage

Autre module spécifique, cette formation traite de tous les aspects souvent négligés par les traducteurs libéraux : les démarches administratives, la fiscalité, la comptabilité, la protection sociale, le pilotage et la stratégie de croissance. Bref, de toutes les connaissances et compétences nécessaires pour réussir en tant qu’entrepreneur.

 

Le suivi pédagogique, réalisé sur trois semaines, vise à répondre à vos questions, accompagner vos démarches et vous fournir des outils pour faciliter la gestion de votre entreprise au quotidien et assurer son avenir.

 

INSCRIPTION ET FINANCEMENT

En s’appuyant sur une équipe pédagogique composée de traducteurs experts, le CI3M propose des formations professionnelles à distance, pour certaines diplômantes, sur l’ensemble des compétences requises pour l’exécution de prestations de traduction ou de rédaction technique. Pour en savoir plus sur le coût de ces formations et les modalités d’inscription, contactez le CI3M au +33 (0)2 30 96 04 42.

 

Selon votre situation, tout ou partie des frais peuvent être remboursés ou pris en charge par le Fonds interprofessionnel de formation des professionnels libéraux (FIF PL), Pôle Emploi, votre Compte personnel de formation (CPF), etc.

 


L'auteur

Professionnelle accréditée en commerce international ayant travaillé plusieurs années en tant que conseillère auprès de PME, Gaële Gagné est traductrice indépendante depuis 2005. Aux commandes de Trëma Translations, elle traduit de l'anglais vers le français et partage ses connaissances en marketing et gestion d'entreprise avec ses collègues traducteurs par le biais d'un blog intitulé Mes petites affaires et de formations dispensées via le CI3M.


Et maintenant ?

Partagez



Abonnez-vous au flux

Consultez d'autres articles :

Diplôme de traduction : indispensable ou superflu ?
Bien facturer pour être payé
Rédiger un devis de traduction efficace
Traducteurs : 3 pistes pour se former sans se ruiner
Nouveaux traducteurs : 10 conseils pour bien démarrer




uri

Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes

This paper systematically discusses the security and privacy concerns for e-learning systems. A five-layer architecture of e-learning system is proposed. The security and privacy concerns are addressed respectively for five layers. This paper further examines the relationship among the security and privacy policy, the available security and privacy technology, and the degree of e-learning privacy and security. The digital identity attributes are introduced to e-learning portable devices to enhance the security and privacy of e-learning systems. This will provide significant contributions to the knowledge of e-learning security and privacy research communities and will generate more research interests.




uri

Coordinated System for Real Time Muscle Deformation during Locomotion

This paper presents a system that simulates, in real time, the volumetric deformation of muscles during human locomotion. We propose a two-layered motion model. The requirements of realism and real time computation lead to a hybrid locomotion system that uses a skeleton as first layer. The muscles, represented by an anatomical surface model, constitute the second layer, whose deformations are simulated with a finite element method (FEM). The FEM subsystem is fed by the torques and forces got from the locomotion system, through a line of action model, and takes into account the geometry and material properties of the muscles. High level parameters (like height, weight, physical constitution, step frequency, step length or speed) allow to customize the individuals and the locomotion and therefore, the deformation of the persons' muscles.




uri

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered.




uri

Insécurité et Gilets Jaunes… tombeau des désillusions.

Il y a quelques jours, je parlais d’émergence d’un nouveau monde bipolaire. Le hasard des écrits faisant parfois bien les choses, depuis quelques jours est apparu dans notre vocabulaire, les Gilets Jaunes. Il ne se passe plus un jour, sans qu’on essaye...




uri

A feature-based model selection approach using web traffic for tourism data

The increased volume of accessible internet data creates an opportunity for researchers and practitioners to improve time series forecasting for many indicators. In our study, we assess the value of web traffic data in forecasting the number of short-term visitors travelling to Australia. We propose a feature-based model selection framework which combines random forest with feature ranking process to select the best performing model using limited and informative number of features extracted from web traffic data. The data was obtained for several tourist attraction and tourism information websites that could be visited by potential tourists to find out more about their destinations. The results of random forest models were evaluated over 3- and 12-month forecasting horizon. Features from web traffic data appears in the final model for short term forecasting. Further, the model with additional data performs better on unseen data post the COVID19 pandemic. Our study shows that web traffic data adds value to tourism forecasting and can assist tourist destination site managers and decision makers in forming timely decisions to prepare for changes in tourism demand.




uri

Exploring the impact of TPACK on Education 5.0 during the times of COVID-19: a case of Zimbabwean universities




uri

International Journal of Information and Computer Security




uri

Form 10-K filing lags during COVID-19 pandemic

This study examines Form 10-K filing lags of US firms during the COVID-19 pandemic in 2020-2021. The findings suggest that filing lags relate negatively to firm size, profitability, hiring Big4 auditors, and filing status, but positively to ineffective internal control, ineffective disclosure control, and going concern opinion. Large accelerated and accelerated filers had shorter filing lags, and non-accelerated filers had longer filing lags in 2020-2021 than 2018-2019. Further analysis provides mild evidence that Big4 auditors contributed to the filing lag reduction in 2020-2021, echoing the view that adopting advanced audit technologies allows Big4 auditors to respond better to the external shocks brought by the pandemic.




uri

Analysing the role of WOM and eWOM in exploring tourist destinations

Word of mouth (WOM) and electronic word of mouth (eWOM) are very effective and important communication tools to persuade consumers for purchasing the products/services. These become more significant with products that are difficult to assess before consumption, e.g., hospitality. The tourism industry is reviving, and the consumer is conscious when booking a particular destination. Thus, it is important to understand how WOM and eWOM are impacting the various factors in distinct ways while choosing the tourist destination. The seven factors identified, for the present study, are channel engagement, expertise, homophily, resource helpfulness, source credibility, tie-strength, and trustworthiness. The PLS-SEM was used to test the theoretical model of this study. The study shows that both WOM and eWOM impact an individual in different ways. The expertise of the reviewer is the most important factor in the case of WOM and channel engagement is the most significant factor for eWOM. Resource helpfulness is common for both WOM and eWOM.




uri

The discussion of information security risk control in mobile banking

The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services.




uri

Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement

Physical Layer Security (PLS) and relay technology have emerged as viable methods for enhancing the security of wireless networks. Relay technology adoption enhances the extent of coverage and enhances dependability. Moreover, it can improve the PLS. Choosing relay and jammer nodes from the group of intermediate nodes effectively mitigates the presence of powerful eavesdroppers. Current methods for Joint Relay and Jammer Selection (JRJS) address the optimisation problem of achieving near-optimal secrecy. However, most of these techniques are not scalable for large networks due to their computational cost. Secrecy will decrease if eavesdroppers are aware of the relay and jammer intermediary nodes because beamforming can be used to counter the jammer. Consequently, this study introduces a multi-agent Q-learning-based PLS-enhanced secured joint relay and jammer in dual-hop wireless cooperative networks, considering the existence of several eavesdroppers. The performance of the suggested algorithm is evaluated in comparison to the current algorithms for secure node selection. The simulation results verified the superiority of the proposed algorithm.




uri

Business intelligence in human management strategies during COVID-19

The spread of COVID-19 results in disruption, uncertainty, complexity, and ambiguity in all businesses. Employees help companies achieve their aims. To manage human resources sustainably, analyse organisational strategy. This thorough research study attempts to find previously unidentified challenges, cutting-edge techniques, and surprising decisions in human resource management outside of healthcare organisations during the COVID-19 pandemic. The narrative review examined corporate human resource management measures to mitigate COVID-19. Fifteen publications were selected for the study after removing duplicates and applying the inclusion and exclusion criteria. This article examines HR's COVID-19 response. Human resource management's response to economic and financial crises has been extensively studied, but the COVID-19 pandemic has not. This paper reviewed the literature to reach its goal. The results followed the AMO framework for human resource policies and procedures and the HR management system. This document suggests COVID-19 pandemic-related changes to human resource management system architecture, policies, and practises. The study created a COVID-19 pandemic human resource management framework based on the literature. The COVID-19 pandemic had several negative effects, including social and behavioural changes, economic shock, and organisational disruption.




uri

Integrating big data collaboration models: advancements in health security and infectious disease early warning systems

In order to further improve the public health assurance system and the infectious diseases early warning system to give play to their positive roles and enhance their collaborative capacity, this paper, based on the big and thick data analytics technology, designs a 'rolling-type' data synergy model. This model covers districts and counties, municipalities, provinces, and the country. It forms a data blockchain for the public health assurance system and enables high sharing of data from existing system platforms such as the infectious diseases early warning system, the hospital medical record management system, the public health data management system, and the health big and thick data management system. Additionally, it realises prevention, control and early warning by utilising data mining and synergy technologies, and ideally solves problems of traditional public health assurance system platforms such as excessive pressure on the 'central node', poor data tamper-proofing capacity, low transmission efficiency of big and thick data, bad timeliness of emergency response, and so on. The realisation of this technology can greatly improve the application and analytics of big and thick data and further enhance the public health assurance capacity.




uri

Knowing thy neighbour: creating and capturing value from a firm's alliance experiences

Intellectual assets, especially its relational forms, have become increasingly important to explain a firm's innovation. To examine relational forms of intellectual assets (IA), this study theoretically and empirically advances a concept of alliance management capability (AMC) to explain the value creation and capture aspects of a firm's innovation process. The concepts of value-creating alliance experiences (VCAE) and value capturing alliance experiences (VCPAE) were introduced in which a firm's ability to learn from these alliance experiences increases the firm's ability to discover and govern partnerships that bring the firm's innovations to market. Hypotheses were developed and empirically examined in the biotechnology industry. A contribution of this study is that a firm's VCAE and VCPAE introduce a greater 'openness' to a firm's innovation process. This openness enables a firm to better adapt and respond to the opportunities of the market and thus impact a firm's competitive advantage to innovate.




uri

Does smartphone usage affect academic performance during COVID outbreak?

Pandemic has compelled the entire world to change their way of life and work. To control the infection rate, academic institutes deliver education online similarly. At least one smartphone is available in every home, and students use their smartphones to attend class. The study investigates the link between smartphone usage (SU) and academic performance (AP) during the pandemic. 490 data were obtained from various institutions and undergraduate students using stratified random sampling. These components were identified using factor analysis and descriptive methods, while the relationship of SU and AP based on gender classification was tested using Smart-PLS-SEM. The findings show that SU has a substantial relationship with academic success, whether done in class or outside of it. Even yet, the study found that SU and AP significantly impact both male and female students. Furthermore, the research focuses on SU outside and within the classroom to improve students' AP.




uri

Database Security: What Students Need to Know




uri

Disaster at a University: A Case Study in Information Security




uri

Digital Forensics Curriculum in Security Education




uri

Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach

Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its student retention. The mechanism suggested by this study was the out-of-class learning approach. Methodology: The researchers in this study employed a content analysis and adopted a semiotic method to analyze qualitative data. The researchers also conducted crosstabulation analyses using chi-square tests to detect the significant differences in the emerging learning outcomes from the two different out-of-class learning activities investigated in this study. Contribution: This study addressed the difficulty of cybersecurity education and proposed a viable mechanism to promote the student learning in such a complicated subject matter. Findings: For cybersecurity education, the out-of-class learning approach is a viable pedagogical mechanism that could lead the students to several learning outcomes, including connecting them to the real-life scenarios related to the cybersecurity profession, guiding them to their career choices and development, stimulating their intellectual growth, creating their justification of learning, and raising their cybersecurity awareness. Recommendations for Practitioners: The instructors of any cybersecurity programs should incorporate some out-of-class learning activities into the courses in their programs, especially the introductory-level courses. Additionally, it is important to coordinate the out-of-class learning activities with the in-class lessons to enable the students to justify what they have learned in their classrooms and motivate them to learn more. Recommendation for Researchers: Researchers could look beyond in-class learning and laboratory learning to investigate the impacts of out-of-class learning activities on cybersecurity education to help the students to attain better learning outcomes. Impact on Society: By promoting cybersecurity education, universities and colleges could attain a higher retention rate of the students in their cybersecurity programs. The higher retention rate of the students in cybersecurity programs would help to ease the critical shortage of cybersecurity talent. Future Research: Future research could explore the impacts of other out-of-class learning activities on cybersecurity learning; for example: job shadowing, attending cybersecurity conferences, internship, developing cybersecurity systems or tools for actual customers, working on cybersecurity research with faculty members. Additionally, future studies could investigate the effects of the out-of-class learning approach on promoting other academic programs that are characterized by intensely complex and technical nature, similar to cybersecurity programs.




uri

Rubric for Measuring and Visualizing the Effects of Learning Computer Programming for Elementary School Students

Aim/Purpose: Although many computer science measures have been proposed, visualizing individual students’ capabilities is difficult, as those measures often rely on specific tools and methods or are not graded. To solve these problems, we propose a rubric for measuring and visualizing the effects of learning computer programming for elementary school students enrolled in computer science education (CSE), which is independent of the programming language being used. Background: In this research, we proposed a rubric based on existing CSE standards and criteria having a programming education-learning goal. We then applied this rubric to actual lessons to visualize the educational effects. Methodology: The proposed new rubric for teaching computer programming, based on existing standards and criteria, was applied to fourth- and sixth-grade students in Japan. We assessed which skills were cultivated through quizzes before and after the teaching. Contribution: This paper contributes on how to make and utilize a rubric for programming education in computer science. We evaluated and visualized the proposed rubric’s learning effects on children and found that our proposed rubrics are independent of any particular method or tool. Findings: The results of this survey are twofold: (1) we proposed a rubric of programming education in computer science, independent of the programming tools used and (2) we succeeded in visualizing students’ learning stages by applying the proposed rubric to programming education conducted in a Japanese elementary school. Recommendations for Practitioners: Evaluating educational effects in CSE is important. In particular, graded assessments of learner abilities can reveal individual characteristics. This research is useful for assessing CSE because it focuses specifically on programming education. Recommendation for Researchers: The rubric’s suggestions and quality improvements in CSE help learners assess their learning progress and will clarify the cultivated computer science skills. Impact on Society: This research evaluates CSE based on a rubric in the programming education field. Future Research: Future work is needed to improve the proposed rubric’s quality and relevance. Also, this rubric should be applied to many classes to increase the number of evaluations and analyses.




uri

Impact of a Digital Tool to Improve Metacognitive Strategies for Self-Regulation During Text Reading in Online Teacher Education

Aim/Purpose: The aim of the study is to test whether the perception of self-regulated learning during text reading in online teacher education is improved by using a digital tool for the use of metacognitive strategies for planning, monitoring, and self-assessment. Background: The use of self-regulated learning is important in reading skills, and for students to develop self-regulated learning, their teachers must master it. Therefore, teaching strategies for self-regulated learning in teacher education is essential. Methodology: The sample size was 252 participants with the tool used by 42% or the participants. A quasi-experimental design was used in a pre-post study. ARATEX-R, a text-based scale, was used to evaluate self-regulated learning. The 5-point Likert scale includes the evaluation of five dimensions: planning strategies, cognition management, motivation management, comprehension assessment and context management. A Generalized Linear Model was used to analyse the results. Contribution: Using the tool to self-regulate learning has led to an improvement during text reading, especially in the dimensions of motivation management, planning management and comprehension assessment, key dimensions for text comprehension and learning. Findings: Participants who use the app perceive greater improvement, especially in the dimensions of motivation management (22,3%), planning management (19.9%) and comprehension assessment (24,6%), which are fundamental dimensions for self-regulation in text reading. Recommendations for Practitioners: This tool should be included in teacher training to enable reflection during the reading of texts, because it helps to improve three key types of strategies in self-regulation: (1) planning through planning management, (2) monitoring through motivation management and comprehension assessment, and (3) self-assessment through comprehension assessment. Recommendation for Researchers: The success of the tool suggests further study for its application in other use cases: other student profiles in higher education, other teaching modalities, and other educational stages. These studies will help to identify adaptations that will extend the tool’s use in education. Impact on Society: The use of Metadig facilitates reflection during the reading of texts in order to improve comprehension and thus self-regulate the learning of content. This reflection is crucial for students’ knowledge construction. Future Research: Future research will focus on enhancing the digital tool by adding features to support the development of cognition and context management. It will also focus on how on adapting the tool to help other types of learners.