Skip to main content

Home/ Classroom 2.0/ Group items tagged Contact

Rss Feed Group items tagged

Kathleen Cercone

Wufoo · Free HTML Form Builder - 0 views

  •  
    Our HTML form builder helps anyone create contact forms, web surveys, and invitations so they can collect the data, registrations and online payments they need without writing a single line of code. Free if * 1 User * 3 Forms * 3 Reports * 10 Fields* 100 Entries / Month
  •  
    Wufoo is an online HTML form builder that helps anyone create beautiful forms, surveys and invitations without writing a single line of code.
J Black

11 Non-Traditional Uses of WordPress - 0 views

  • the end result is a moderated directory
  • reate a directory on your website or blog where users can submit information about themselves or their business.
  • ort of image bookmarking service for those who have access
  • ...7 more annotations...
  • RecruitPress is a fee job board option.
  • Build a ‘WordBurner’ Email Newsletter Manager Using WordPress and FeedBurner.
  • hosting a forum on your site,
  • contact manager.
  • WordPress Wiki is a premium theme ($30)
  • review site
  • WP e-Commerce is a surprisingly powerful free plugin that will allow you to sell items through your WordPress-powered site or blog.
  •  
    In this article we'll take a look at a combination of tutorials, plugins and themes that can help you to use WordPress in non-traditional ways. Hopefully you'll find something that you can use, or at least something that will be a valuable learning resource for extending your knowledge and skills of working with WordPress.
Dennis OConnor

21CIF: 21st Century Information Fluency - 0 views

  • Power Searching In a Web 2.0 world. ($99 Fee 5 CEUs) New to this site? Click the course title and you will be able to create an account and register for this 4 week facilitated class! Contact: Dennis O'ConnorOpen for enrollment! Begins February 9, 2009Login as Guest to view!
  • Introduction to Google Documents: Collaborate & Share Enroll now! February 9, 2009 1 - 5 (5 Days | One Week) 5 CDPUs Learn to use Google Word Processing Documents for productivity and collaboration. Trouble creating your account? E-Mail: wiredinstructor@gmail.comLogin as Guest to view!
  •  
    21st Century Information Fluency Project Online Course Page: Lists 1 - 4 week courses in search skills and google docs
Jorge De La Garza

VoiceThreads Integration participation help... - 50 views

Evening! Lead: Looking for Educators to participate in Voicethread site on Wednesday evening. I'm currently a grad student at the University of Houston Clear Lake working on my Master of Instruc...

Voicethread moodle

started by Jorge De La Garza on 18 Nov 08 no follow-up yet
ehudza

A new academic knowledge sharing platform - wePapers.com - 59 views

Hi all, We have just released (today actually) our new startup - http://www.wepapers.com wePapers allows students and lecturers share, find, and manage their academic documents. We would love t...

documents papers

started by ehudza on 17 Nov 08 no follow-up yet
Melissa Seifman

Acceptable Use Policy - 107 views

You may want to contact our SN@P department to get some background information on how it was done, problems that we had to work through, and other things Scot Byrd wrote: > Melissa, > Thank you s...

computers 1to1 computer use

Sheri Edwards

Cell phones in education - 53 views

Another free resource that will have your kids texting away on their phones is PollEverywhere. I put a link in my tiny (so far) list of bookmarks. I have used Polleverywhere a few times in class ...

technology teaching cell phones

J Black

Vast Spy System Loots Computers in 103 Countries - NYTimes.com - 0 views

  • The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
  • The electronic spy game has had at least some real-world impact, they said. For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities.
  • “This could well be the C.I.A. or the Russians. It’s a murky realm that we’re lifting the lid on.”
  • ...2 more annotations...
  • “The Chinese government is opposed to and strictly forbids any cybercrime.”
  • two computer researchers at Cambridge University in Britain who worked on the part of the investigation related to the Tibetans, are releasing an independent report. They do fault China, and they warned that other hackers could adopt the tactics used in the malware operation.
  •  
    The malware is remarkable both for its sweep - in computer jargon, it has not been merely "phishing" for random consumers' information, but "whaling" for particular important targets - and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
Steve Ransom

Leaving 'Friendprints': How Online Social Networks Are Redefining Privacy and Personal ... - 0 views

  • "Our kids today will give everything [in terms of personal information] away, but it's not at all clear how this will shake out in the long run,"
    • Steve Ransom
       
      A marketer's gold mine, among other things.
  • And what about the person you don't really know who wants to be your friend because you have some friends in common? According to Hoffman, that new friend may just be mining your social circle for information. As networks grow and more friends of friends (and their friends) are accepted by users, it's unclear who can be trusted.
    • Steve Ransom
       
      Hmmmm... this has occurred to me before, but I'm not sure how real it is our how paranoid we should be. However, we do need to take a look at our followers' digital footprints (blogs, tweets, posts, pages,...) if suspect.
  • Hoffman illustrated how social connections are made online and the ease with which a stranger can become part of a network.
  • ...5 more annotations...
  • When a business contact from the LinkedIn world wants to become your friend on Facebook, do you accept the invitation, giving them access to the photos on your Facebook profile from last summer's rowdy beach party?
  • Third-party applications, he argued, can take that data outside of the friendly confines of a social networking site and combine it with data from other sources to piece together enough information to steal a person's identity.
    • Steve Ransom
       
      That's always been my feeling about 3rd party apps. I don't use them for the most part.
  • According to Acquisti, people are more likely to divulge key personal information -- their photo, birthday, hometown, address and phone number -- on social networking sites than they would on other web sites
  • In one study, Acquisti found that that people will divulge information when they see others doing so. That tendency, he believes, may explain why so many people are willing to dish out personal information on the networks.
  • Holy Grail for marketers is to track consumers and their friends -- and what they say about a product -- via social networks. "People are more willing to divulge information for social purposes, and the lead users are 18 to 25 years old," Bradlow notes. "The social norms around privacy aren't going to be what they were before."
  •  
    The information provides opportunities not only for legitimate business purposes, but also for the nefarious aims of identity thieves and other predators, according to faculty at Wharton and elsewhere.
Dennis OConnor

Electronic Literature - 0 views

  • This is a beta-launch. I would like to work directly with some high school/college classes to refine the exercises. Please contact me at deenalarsen AT yahoo.com. Thanks.
  •  
    Electronic literature uses links, images, sound, navigation, as well as text to convey meaning. Electronic literature is ergodic, and thus it is up to the reader to piece together the materials as the reader goes through the work. Elit 101explains how these elements work to convey meaning and provides examples and exercises for each element.
Kathleen N

Steve Barkley Ponders Out Loud: RESPONSIVENESS - 0 views

    • Kathleen N
       
      Doesn't take much, does it?
  • "So some teachers got a page that showed that no student selected them?" I asked. "Yes," the storyteller informed me. "We thought every teacher needed to know how they were perceived by the students. We simply gave them the information." At this point each professional staff member was asked to select one student from the list who had indicated no relationship with a teacher. Care was taken to make sure each student was selected by someone. Throughout the year teachers were asked to reach out in special ways to this student. Their efforts included:1. Send three "I noticed…." statements a week.2. Give one eye-hug a day (sustained eye contact ending with a smile).3. Give two physical touches a week (high-five, pat on the back, shoulder squeeze, handshake).4. Use the person's name every day.5. Be in their proximity three times a week (other than in the classroom).6. Ask them for help once a week7. Ask their opinion about something once a week.
  •  
    Great post with true anecdote on a ms program to improve climate "One hundred and twenty-one students filled out the forms. Some students listed several teachers. Others mentioned one or two. Twenty-five middle schoolers listed no teacher they felt they had a positive relationship with."
shell zaldivar

Elements of a Custom Twitter Background - 0 views

  • Twitter Background Components The components of a Twitter background will differ according to the needs and goals of each company’s social media campaign, but the most common elements include:
  • Brand Identity
  • Contact Information
  • ...4 more annotations...
  • Headsh
  • Company Profile:
  • Call to Actio
  • Special Deals:
  •  
    Here you'll find the most common elements of a good twitter background
Philippe Scheimann

B.L. Ochman's blog: Some Social Media Search Tools I Like: I'll show you mine if you sh... - 34 views

  • Some Social Media Search Tools I Like: I'll show you mine if you show me yours.
  • Here are some of the tools and apps I like for social media search. Got others? Twitseek: enter a URL, hashtag or keyword and it finds Tweets related to themHashtags.org tracks #hastags and also trends each one and shows you most popular ones Poll Everywhere lets you poll by SMS, Twitter or the Web in real-time. It replaces clunky audience response hardware at events and lets people use their phones to respond. Kikin kills me! It augments Google searches with relevant information from my social media contacts. So, if I'm shopping, I can get opinions, prices, see reviews and more, without ever leaving the product page. There's a good review on Techcrunch. Tweetscan Twitter search tool that updates every second and will send you emails when your keywords are mentioned, or let you back up your Twitter stream, which Twitter purges regularly Twitscoop searches and tracks search terms, can create a graph of results if there's enough data. It'll show the trend for your keyword activity/popularity Tweepsearch twitter profile and bio search by keywords Twitstat searches and also shows search trends Twitter Search (formerly Summize) isTwitter's own search engine, and the advanced version is very robust Backtweets : enter a URL and it finds Tweets that linked to it. Mr. Tweet recommends people to follow, communities to join, communities your friends and followers are in, and hot topics in communities. Tweetmi displays the most active Twitterers and top stories from the people you follow. So it's a personalized aggregation of your feed, displaying the the real-time conversation. One Riot is a real-time search engine that crawls the links people share on Twitter, Digg and other social sharing services, matches them to trending topics on Twitter or ones you search. Collecta does a real-time meta search on topics you choose, and, unlike most other search tools, saves your searches for future use.
  •  
    good list of social media search tools
  •  
    finding your way in social media
liza cainz

Superb Backup Services - 1 views

In the accounting firm where I am working, a safe data backup system is very vital to the daily operations of the business. To ensure data security, the management hires expert computer support pro...

support service Desktop computer technical services PC tech

started by liza cainz on 17 Feb 11 no follow-up yet
liza cainz

HP Support Service for Printers - 1 views

In the office, frequent glitches of our HP DeskJet printer are a major source of headaches and stress. That is why I decided to hire the services of Help Gurus who is known to be a credible provide...

support service Desktop computer technical services PC tech

started by liza cainz on 23 Feb 11 no follow-up yet
mbarek Akaddar

iCyte - Join - 30 views

  • If you're a student or faculty member of an educational institution, complete the form below to create your iCyte Education account free of charge. Only users with valid educational e-mail addresses (e.g. .edu, .ac.uk, laurelschool.org) will be accepted. Contact us if your valid address is refused by this form
liza cainz

Comprehensive Help and Support for Computer Beginners - 1 views

I am a beginner when it comes to computer stuff. I really had a difficulty of mastering a digital machine like computers partly because there is no one who can teach me. I am really eager to know h...

support service Desktop computer technical services PC tech

started by liza cainz on 24 Feb 11 no follow-up yet
Nikki Red

SEO is a Smart Online Marketing Investment - 1 views

Just a few months ago, my small computer store in Kent was almost to go bankrupt with only a few thousand pounds left in my bank account. Fortunately, a good friend of mine referred me to Nick Redd...

SEO consultant UK technology tools resources learning teaching

started by Nikki Red on 31 May 11 no follow-up yet
Junior Brickie

Buying Brickadoo Online Was My Last Resort - 2 views

I have always been a fan of toy buildings since I was a kid. But now I that I am a teen my love for it has not even faded one bit. That is why when the newest set of Brickadoo was released in UK to...

UK toy stores

started by Junior Brickie on 20 Jul 11 no follow-up yet
« First ‹ Previous 321 - 340 of 501 Next › Last »
Showing 20 items per page