Skip to main content

Home/ educators/ Group items tagged reading software

Rss Feed Group items tagged

Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Vicki Davis

Fever° Red hot. Well read. - 8 views

shared by Vicki Davis on 15 Dec 12 - Cached
  •  
    A new RSS reader has come on the scene called Fever. It lets you say "how hot" certain feeds are for you and also looks at the web and predicts the hottest things for you to read. I'm on my ipad this weekend so I can't buy and install fever (I think it resides on a Mac -- looking for a PC version now.) This is basically software that one person designed that is getting some buzz in tech circles for usability and making RSS feed reading manageable again. Worth a look.
Ben Rimes

Prizmo for iPhone, iPod touch, and iPad - 15 views

  •  
    Optical character recognition (OCR) software for the Apple iDevices that will scan any text, and then output it to text for e-mail, documents, or spreadsheets. Also includes text reading, which would make it very valuable for both students with visual disabilities and reading/decoding problems.
Patricia Cone

Point N See - 8 views

  • Speed Reading III
    • Patricia Cone
       
      OOps, I bookmarked the wrong page, but I've highlighted the link.
  •  
    There are lots of amazing software here for download.  I was looking at Speed Reading 111 (Mac).    The text is small (I'm tutoring people with reading problems) but I set my screen to a different resolution and the print was bigger.  
Patti Porto

Twurdy Search - Search for Readable Results - 19 views

  •  
    Type in a search term and your results come back coded by readability level The name "Twurdy" comes from a play on words with the question "Too Wordy?". The philosophy Everyone has different reading abilities. Some people searching the web are university professors and others are 5 year old children. Twurdy has been created to provide people with access to search results that suit their own readability level. What does it do? Twurdy uses text analysis software to "read" each page before it is displayed in the results. Then Twurdy gives each page a readability level. Twurdy then shows the readability level of the page along with a color coded system to help users determine how easy the page will be to understand.
Ruth Howard

Clicker - About Clicker 5 - 0 views

  •  
    There' s a group here in Tassie gathering to learn this software- the video reveals an adaptable resource that automatically forms sentences with clearly audible speech, images and text simultaneously. Clicker is a writing-support tool for any subject area. Build sentences by selecting words, phrases and pictures; hear words spoken by realistic software speech before you write; and hear completed sentences spoken back to you!
Patti Porto

Rewordify.com: Understand what you read - 22 views

  •  
    "ewordify.com is powerful, free, online reading comprehension and vocabulary development software. It helps people understand difficult English faster, helps them learn words in new ways, and helps teachers create high-interest learning materials from any English text passage. See the yellow box at the top of the page? Just paste in a difficult English sentence, paragraph, or more, or enter a web page URL and click the button. You'll instantly see an easier version, for fast understanding now. No dictionary needed! Plus, the easier version is specially highlighted to help build vocabulary."
Lisa M Lane

Online Education - Introducing the Microlecture Format - Open Education - 0 views

  • in online education “tiny bursts can teach just as well as traditional lectures when paired with assignments and discussions.” The microlecture format begins with a podcast that introduces a few key terms or a critical concept, then immediately turns the learning environment over to the students.
  • “It’s a framework for knowledge excavation,” Penrose tells Shieh. “We’re going to show you where to dig, we’re going to tell you what you need to be looking for, and we’re going to oversee that process.”
  • It clearly will not work for a course that is designed to feature sustained classroom discussions. And while the concept will work well when an instructor wants to introduce smaller chunks of information, it will likely not work very well when the information is more complex.
  • ...3 more annotations...
  • 1. List the key concepts you are trying to convey in the 60-minute lecture. That series of phrases will form the core of your microlecture. 2. Write a 15 to 30-second introduction and conclusion. They will provide context for your key concepts. 3. Record these three elements using a microphone and Web camera. (The college information-technology department can provide advice and facilities.) If you want to produce an audio-only lecture, no Webcam is necessary. The finished product should be 60 seconds to three minutes long. 4. Design an assignment to follow the lecture that will direct students to readings or activities that allow them to explore the key concepts. Combined with a written assignment, that should allow students to learn the material. 5. Upload the video and assignment to your course-management software.
    • Lisa M Lane
       
      This really isn't lecture - it's more like an introduction to guide them toward reading and discussion.
  • the microlecture format similarly requires teachers to get the key elements across in a very short amount of time. Most importantly, it forces educators to think in a new way.
  • Given that it is tough to justify the traditional lecture timeframes
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Ed Webb

Peru's ambitious laptop program gets mixed grades - Yahoo! News - 0 views

  • what we did was deliver the computers without preparing the teachers
  • the missteps may have actually widened the gap between children able to benefit from the computers and those ill-equipped to do so
  • Inter-American Development Bank researchers were less polite."There is little solid evidence regarding the effectiveness of this program," they said in a study sharply critical of the overall OLPC initiative that was based on a 15-month study at 319 schools in small, rural Peruvian communities that got laptops."The magical thinking that mere technology is enough to spur change, to improve learning, is what this study categorically disproves," co-author Eugenio Severin of Chile told The Associated Press
  • ...10 more annotations...
  • OLPC laptops, which are rugged and energy efficient and run an open-source variant of the Linux operating system, are in Ethiopia, Rwanda, Mongolia and Haiti, and even in the United States and Australia. Uruguay, a compact South American nation of 3.5 million people, is the only country that has fully embraced the concept and given every elementary school child and teacher an XO laptop
  • no increased math or language skills, no improvement in classroom instruction quality, no boost in time spent on homework, no improvement in reading habits
  • On the positive side, the "dramatic increase in access to computers" accelerated by about six months students' abstract reasoning, verbal fluency and speed in processing information
  • "We knew from the start that it wouldn't be possible to improve the teachers," he said, citing a 2007 census of 180,000 Peruvian teachers that showed more than 90 percent lacked basic math skills while three in five could not read above sixth-grade level.
  • Each teacher was supposed to get 40 hours of OLPC training. That hardly helped in schools where teachers had never so much as booted up a computer. In Patzer's experience "most of them barely knew how to interact with the computers at all."
  • In the higher grades, Martinez said, children's use of the machines is mostly social
  • "For them, the laptop is more for playing than for learning,"
  • Negroponte thinks the main goal of technology educators should be simply getting computers into poor kids' hands.His proposal last year to parachute tablet computers from helicopters, limiting the involvement of adults and "educators," caused some colleagues to wince. But Negroponte is dead serious, and has begun a pilot project in two Ethiopian villages to test whether tablets alone, loaded with the right software, can teach children to read.
  • The OLPC team always considered Internet connectivity part of the recipe for success. They also insisted that each child be given a laptop and be permitted to take it home.Uruguay, a small, flat country with a far higher standard of living and ubiquitous Internet, has honored those requirementsPeru did not
  • Some schools didn't have enough electricity to power the machines.And then there was the Internet. Less than 1 percent of the schools studied had it.
1 - 20 of 41 Next › Last »
Showing 20 items per page