Skip to main content

Home/ ACSE Discussion/ Group items tagged information

Rss Feed Group items tagged

Doug Peterson

This is What a Tweet Looks Like - 0 views

  •  
    Think a tweet is just 140 characters of text? Think again. To developers building tools on top of the Twitter platform, they know tweets contain far more information than just whatever brief, passing thought you felt the urge to share with your friends via the microblogging network. A tweet is filled with metadata - information about when it was sent, by who, using what Twitter application and so on.
Doug Peterson

Computer Science Collaboration Project - 1 views

  •  
    Please provide the following information to register for "CSTA: Services and Resources to Engage Youth in Computer Science". CSTA is the Computer Science Teachers Association, a membership organization of 10,000 educators, institutions, and companies dedicated to supporting and promoting the teaching of computer science and other computing disciplines in K-12. This webinar will focus on services that CSTA provides for formal and informal educators and the free resources it provides for helping young people, their families, and their educational community better understand the computing disciplines and the world of opportunities they provide.
Doug Peterson

InMotion Hosting - HTML5 Cheat Sheet - 0 views

  •  
    "Web hosting is our specialty but we also like to share useful information with our community of web developers and designers. Below are three very comprehensive HTML5 cheat sheets that can be easily printed or posted on your website using the provided HTML code."
tech vedic

Technical - 0 views

shared by tech vedic on 24 May 13 - No Cached
  •  
    Techvedic, a leading technical support enterprise, has been established with a core vision to simplify Information Technology and make its derivatives more purposeful and sensitive for individuals and businesses. Currently, we are serving offshore home and small-business consumers across the United States, Canada, Australia and the United Kingdom via online and on-site support modules.
tech vedic

How to perform Genuine Windows System Scan ? - 0 views

  •  
    Scanning your system is a necessary task. But, there are other tasks which are necessary while scanning your PC. This Techvedic tutorial outlines the privacy policy related with scan, what to do if Windows running on your PC can't complete the scan as well as additional information to keep up PC health.
tech vedic

Computer security outlook: Online identity theft and juxtaposed security initiatives - 0 views

  •  
    E-commerce, gaming, and social networking sites are grabbing the maximum attention, where you knowingly, or sometimes even unknowingly submit your personal information. And, Internet perpetrators are taking advantage of the pervasive Internet, people's growing dependencies on the Web, and addiction thereof. Thus, what you share on the Web, and with whom you share is an area of concern.
tech vedic

10 secrets for creating professional Excel Tables - 0 views

  •  
    Working with Excel - creating, viewing, editing and moving records - and understanding details thereof and deriving conclusion from it become easier with the advanced tools integrated with the Excel tables. For instance, if you want a row or column to come with total value, it would do so. Formatting and sorting data can be done in a quick and easy way without having much competence. And, eventually you can create a professional Excel tables that would help you manage information in a better manner.
tech vedic

How to avoid email overload? - 0 views

  •  
    Your email inbox bears all - high-priority meetings with boss, quick project update, strict whip to meet deadlines, corporate party or outing - and at times, you may be puzzled as what, when and whom to reply. Yes this is a common dilemma, courtesy the Information Technology. Hence, email management is a must-to-seek lesson. Don't take otherwise, here the management is for your good. See how?
Doug Peterson

CSIT Symposium 2012 | doug - off the record - 0 views

  •  
    Well you don't have to look far. This year the Computer Science and Information Technology Conference (CS & IT) has all these things and a whole lot more. Please join like-minded computer science and IT educators for a great learning experience July 9th and 10th, 2012, in Irvine, California. 
Doug Peterson

Your iPhone's Privacy Sucks Because of Apple—and Even Steve Jobs Agrees - 0 views

  •  
    Someone found out that Path-and most probably other apps-was stealing your contacts' information from your iPhone and iPad without telling you about it. This happened because of Path's greediness, but also because Apple is not protecting your privacy as it should.
Doug Peterson

Pex4fun, an online lab for APCS - Computer Science Teacher - Thoughts and Information f... - 1 views

  •  
    Are you teaching Advanced Placement Computer Science? Are you looking for supplemental exercises that may help you students with the concepts? If so this announcement may be of interest to you. Pex for Fun has been around for a while offering coding duels in C#, F# and Visual Basic. Recently though it was decided to invest some time, money and effort to adapt some exercises specifically to help learn APCS concepts. Most students find the differences between Java and C# pretty minor at this level so most APCS students will find this doable even if they have only been taught Java previously.
Peter Beens

Use the Crucial System Scanner software to find out what type of memory is in your comp... - 0 views

  •  
    The Crucial System Scanner automatically analyzes your computer memory information and suggests an upgrade that's guaranteed compatible.
Doug Peterson

A radical manifesto for teaching computing | Education | The Observer - 2 views

  •  
    There is a growing consensus that the way children in schools are being taught information technology is in need of a radical overhaul. Here John Naughton explains the problem and offers a manifesto for revolutionary action
Doug Peterson

The Evil that Spyware Can Do | Regillo Consulting Group - 0 views

  •  
    Spyware usually refers to software that is created with the sole purpose of taking partial or complete control of a person's computer without the permission of the owner of the computer. What spyware does is that it uses the resources in your computer to report certain information to someone else that you do not know. Simply put spyware spies on you and on your computer.
Doug Peterson

Diagnosing a Blue Screen of Death Error in Windows - 0 views

  •  
    Diagnosing a Blue Screen of Death Error in Windows For many years now the famous Blue Screen of Death (BSoD) has been the ultimate indication that something disastrous has happened to make your computer die, but how useful is the information in the BSoD and the respective crash dump file that Windows produces?
Doug Peterson

Large collection of Free Microsoft eBooks for you, including: SharePoint, Visual Studio... - 1 views

  •  
    Throughout the year I try to share resources and information with you that I think will be helpful for you. Often times these resources will include links to free eBooks that we make available on a variety of topics. Today, I thought I would post a large collection of eBooks for you here so that you can find them in one place and consume them as you see fit. Also, if you find this list helpful, please share it with your peers and colleagues so that they too can benefit from these resources.
Doug Peterson

How To Read Code - Computer Science Teacher - Thoughts and Information from Alfred Thom... - 2 views

  •  
    "We don't teach students how to read code. Actually we don't event teach them that they should read code for the most part."
tech vedic

HOW TO PROTECT AGAINST SPYWARE? - 0 views

  •  
    Viruses, spyware and malware are some of the serious issues related to computer. Without your permission, if your Internet program is tracking and sending information back to a third party then your computer must be spyware infected. Let's uncover some essential tips to protect against spyware.
tech vedic

HARD DRIVE WIPE - 0 views

  •  
    Want to get rid of your old computer? But, remember to erase all your personal information from its hard drive before discarding it. In this tutorial, follow the steps to wipe out the hard drive of your computer for cleaning its data.
tech vedic

How to password-protect a PDF before e-mailing in OS X? - 0 views

  •  
    Protecting a document containing sensitive information is very important. Thus, protecting it with password is a better option. This tutorial contains steps for protecting your PDF document with password before sending it to receiver.
1 - 20 of 48 Next › Last »
Showing 20 items per page