Skip to main content

Home/ educators/ Group items tagged firewalls

Rss Feed Group items tagged

Vicki Davis

In Pakistan, a New Push for Education by Mujib Mashal on Beacon - 0 views

  •  
    Pakistan is pushing to educate more of its children, amidst financial woes and a struggle for more funding. Their goal: 100% enrollment. Of course, there is a great effort also to build a firewall in Pakistan much like the "great firewall of China." That said, there are many lovely educators from Pakistan who contribute and connect increasingly online and I wish this country well as well as the many countries working to increase enrollment. "As schools returned to session in Pakistan's northwestern Khyber Pakhtunkhwa (KP) province this fall, the newly elected provincial government - with the help of the non-profit campaign Alif Ailaan - launched an enrollment drive. In its first month, the drive managed to enroll nearly 245,000 out of school children - about 65% male and 35% female - across 25 districts of the province, according to figures provided by Alif Ailaan. But considering Pakistan's education woes, where more than 25 million children between the ages of 5-16 remain out of school, it is a small step. "In order to provide schooling to all the kids, we need about Rs. 138 billion (roughly $1.2 billion) just in KP - for school infrastructure, classrooms, teachers so on and so forth," Joudat Ayaz, the province's education secretary, told me over dinner. Ayaz estimates the number of out of school children in KP between 2 to 3 million, about 20% to 30% of the school-age children in the province. "You can't do this [reaching 100% enrollment] in one go - you have to do it progressively, over six or seven years.""
Vicki Davis

Optimize your network for Hangouts - Google Apps Administrator Help - 4 views

  •  
    Having problems with Google hangout? Send this information to your network administrator with port information for the firewall that they'll need to know.
Dave Truss

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  • "We need to create places where teachers can take chances," Honeycutt says. “Every district needs to anoint some teachers to play with Web 2.0 tools in a safe, hypothetical environment. I call it taming the tool. Teachers need time to consider, 'Under what conditions would we allow this tool into the classroom?'"
  • “We realized that students don't see these as impediments, but rather as challenges,” Canuel says. "Students find ingenious ways to go around them." Rather than fighting to stay a step ahead of tech-savvy pupils, the district emphasizes online safety and digital citizenship.
  • Instruction in digital citizenship needs to start early,
  • ...1 more annotation...
  • In the still-evolving Web 2.0 era, anyone with Internet access has the power to create and publish content online and interact with content others have created.
  •  
    Content filters and firewalls are great for keeping kids away from pornography, as required by the Children's Internet Protection Act, or preventing them from updating their Facebook status during class. But the same filters can stop teachers from accessing cutting-edge widgets and digital materials that have enormous potential for expanding learning.
Vicki Davis

Bing censoring Chinese language search results for users in the US | Technology | thegu... - 2 views

  •  
    The great firewall of china comes to the US via Bing. It looks like Bing is filtering Chinese language searches in the US to match more what someone would see INSIDE China. This is pretty disturbing but also points to the challenges of creating different "filters" by country and also knowing where people are coming from (due to the use of proxies.)
Maggie Verster

YouTube online Converter and downloader - 0 views

  •  
    Great idea to first download the video before sharing with learners. This solves the firewall hassle and saveguard them for "getting lost"
Martin Burrett

VideoDuke: Advanced Video Downloader for Mac - 0 views

  •  
    "There is a wealth of video content available online that can help the teaching and learning process, but some of the main issues of using online content within the classroom include inappropriate advertising, inappropriate recommendations, and the dreaded school firewall or slow internet connection. Yet, gaining access to such video content can really help to explain certain concepts, with opportunities to include footage, clips or teaching points in the lesson."
Vicki Davis

Content Filtration: A little dirt for your health? - 1 views

  •  
    I was rereading this old post for some writing I'm doing about filtering and it struck me that although this post was written in 2008 it reads like it was written this morning. I think there are some very valid arguments to share as you discuss content filtering in your school. When asked about how to help kids with allergies, researchers have made the bold statement , "Let them eat dirt! " As I read these articles, I was struck with the parallel to the content filtration debate that rages in education today.
Gary Bertoia

Teaching How to Learn | blog of proximal development - 0 views

  • his “context of public scrutiny” is of great importance here. The safety of the self-contained classroom, one separated (by walls and firewalls) from the rest of the world - the world we are supposed to prepare our students for - goes against everything that surrounds young people today and prevents them from learning how to navigate the complex online world.
  •  
    What, I kept asking myself, can educators learn from this report? More importantly, how can these lessons then be applied in our classrooms and teacher education programmes?
Vicki Davis

fullduplex.org » How to Get Around Blocked Web Sites at School or Work: A New... - 0 views

  •  
    How students (and teachers) get around your firewall
  •  
    Just want you to see the page that your students will probably look up before they start school. Remember that working on behavior is better than trying to block. Also, dealing when behavior when caught instead of punishing your IT department is more appropriate.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dean Mantz

ASCD Inservice: Tapscott on Changing Pedagogy for the Net Generation - 10 views

  • Collaboration is another major hallmark of the Net Generation. However, Tapscott said, we have a tendency to squander or prohibit this strength in schools and workplaces.
  • "What do we do with this collaboration-geared generation? We stick them in a cubicle, supervise them like they're Dilbert, and take away their tools (i.e., blocking sites like Facebook and Youtube)." Tapscott calls this creating a generational firewall. "It says, 'We don't get you, we don't understand your tools, and we don't trust you to use them.'"
  • We can’t just throw technology in a classroom and expect good things," notes Tapscott. We need to move away from an outdated, broadcast-style of pedagogy (i.e., lecture and drilling) toward student-focused, multimodal learning, where "the teacher's no longer in the transmission of data business; she's in the customizing-learning-experiences-for-students business."
  • ...1 more annotation...
  • we must consider eight norms for the Net Generation: freedom, customization, scrutiny, integrity, collaboration, entertainment, speed, and innovation.
  •  
    To reshape pedagogy, Tapscott says that we must consider eight norms for the Net Generation: freedom, customization, scrutiny, integrity, collaboration, entertainment, speed, and innovation.
Maggie Verster

Great stuff!!!! Librarians' Internet Index - 7 views

  •  
    This is a list of sites compiled by librarians to safe use internet sites. A great reference for school administrators, techies and teachers. It is a maintained directory of sorts and you can submit safe sites.
Vicki Davis

Legal Experts on How Murdoch's Threats May Impact "Fair Use" Doctrine | BNET Media Blog... - 2 views

  • Media industry titan Rupert Murdoch’s explicit threats this week to block Google from searching his content sites, and to sue the BBC for its use of content he says is “stolen” from his sites got me to wondering whether the head of News Corp. has, in fact, any basis in the law for launching these calculated attacks at this time and in this manner.
  • Murdoch perhaps does have at least a narrow legal perch to stand on.
  • he is not trying to grow his audience any longer, he says.
  • ...9 more annotations...
  • is for nonprofit educational purposes;
  • the effect of the use upon the potential market for or value of the copyrighted work.
  • he says he is re-tuning his business model around monetizing his content.
  • four factors in determining whether the reproduction of any copyrighted work qualifies as Fair Use
  • he’s trying to shrink his audience back to the people who will pay for his content
  • Therefore Google’s caching of his content would make it free even as he’s trying to charge for it
    • Vicki Davis
       
      So basically, Google is taking something he wants to charge for and making it free. But my question is, if he wants to charge for it, shouldn't it be bedhind some sort of firewall or is it Google's job to see which sites it is allowed to index? Aren't there certain protocols that make the Net what it is? Certain standards? Isn't one of those the open indexing or crawling of unprotected sites? I'm not sure but hoping someone will respond.
  • Google allows Murdoch, or any publisher, to “opt out” of allowing its pages to be indexed?
  • know how to use the Robots Exclusion Protocol
  • he wants a closer relationship with Google.
  •  
    Excellent overview of Rupert Murdoch's taking on of Google and that they should not index his sites, even though he can easily opt out of indexing, that they are somehow demonetizing his work by searching since he wants to "reduce his audience to those who will pay" not "increase his audience." This is a fascinating read and case study for those following Fair Use.
1 - 15 of 15
Showing 20 items per page