Skip to main content

Home/ Classroom 2.0/ Group items tagged Secure

Rss Feed Group items tagged

2More

Q&A on diaspora - 5 views

  • What do you think are the most important features a social network should have? How would you prioritize them? Do you plan to Build Less or go big? If building less, what is the minimal set of features you can get away with? We plan to “build less.” These are the features which we aim to complete first: 1. A good secure protocol, encrypted at every leg, including a specification for a lightweight, probably HTTPS, RESTful set of routes. We see all of this communication happening between two Diaspora servers, rather than strictly between peers. We realize there is the problem with polling with this model, but we think there are several tricks worth trying which all have their relative pros and cons: PubSub (fast and easy, requires some level of centralization), querying friends servers from the browser side and posting responses back (requires browser side decryption) to name a couple. Alternatively, we are considering going with XMPP altogether due to the ability to be able to push content between nodes, but we need to research it further to see if it is something we would want to implement. 2. A datastore and corresponding interface that can store all of your stuff in one place. MongoDB is what we are looking at for V1, but the redundancy of TahoeFS is intriguing(as well as serving a slightly different purpose). 3. A clear extension framework. Diaspora will be service-agnostic and we will need to make it easy to import from and export to any format/web service. It is also our goal to make Diaspora as content-agnostic as possible, by providing abstract data types and an easily extended UI so that whatever new content people want to store and share can be integrated without re-rewriting parts of the whole application stack. 4. Be your own OpenID provider. Having a single identity across lots of services is great, but why trust a web service to hold it? Once we are the keepers of our own data, we can also selectively allow services access to it through Oauth.
  •  
    alternative to fb...
1More

How to remove RST Antivirus 2010 - 0 views

  •  
    How to remove a rogue computer program RST-Antivirus-2010
1More

How to remove ACommander - 0 views

  •  
    How to remove a rogue program ACommander
1More

How to remove RemoteAbc.exe - 0 views

  •  
    How to remove a virus that creates RemoteAbc.exe
1More

Army Social Media Handbook 2011 - 0 views

  •  
    Social Media Handbook. from US Army. This is interesting for schools too.
9More

Michael Geist - Pulling a Fast One?: Who Is Really Hurt By C-32's Missing Fair Dealing ... - 6 views

  • linking copyright infringement to circumvention is compliant with the WIPO Internet treaties, it is an approach that has been adopted by other countries, and it is one that has been promoted by many groups supportive of copyright reform
  • several countries have proposed or passed legislation that explicitly links circumvention with copyright infringement, including New Zealand, Switzerland, Canada (Bill C-60), India, and Brazil. 
  • Italy permits circumvention for private copying, Greece established a legal right to pursue access, and the Netherlands grants the Justice Department the power to decree access
  • ...6 more annotations...
  • Bill C-32 currently includes circumvention exceptions for several purposes including privacy, security research, and encryption. Adding fair dealing means adding five categories of new exceptions -  research, private study, news reporting, criticism, and review.
  • The second group of circumventers consists of those Canadians who believe that circumvention is a reasonable exercise of their consumer rights. These include Canadians who unlock their cellphones or format shift a DVD.
  • Consumers unlock their phones because they believe it is their property and they should be entitled to do so (the government agrees as there is an exception for this in C-32).
  • They similarly format shift DVDs because they reasonably believe that purchasing a DVD should entitle them to watch the DVD on the device of their choice
  • the sale of the products is often based on the presumption that the consumer will have the ability to unlock, make a backup, or format shift
  • If the law does not include a fair dealing circumvention exception, teachers will follow guidelines that prohibit circumvention as part of the educational process and students will be stopped from creating mashups or engaging with digital materials in certain ways.

Complete Support for Desktop Computers - 1 views

started by Maria Babae on 10 Aug 11 no follow-up yet
1More

Oracle Tutorials - 0 views

  •  
    A blog and a website which talks about everything under the technology umbrella. This site includes tutorials, interview questions, leadership articles, SEO concepts, affiliate marketing concepts, internet security. Tutorials on SAP, Java, SOA, TIBCO and all other software and hardware technologies.

Trusted PC Tech Support - 1 views

started by pctechsupport on 13 Sep 11 no follow-up yet
3More

Education Week: The Classroom Is Obsolete: It's Time for Something New - 17 views

  • The following is a fairly universal list of education design principles for tomorrow’s schools, though it would be tailored to the needs of particular communities: (1) personalized; (2) safe and secure; (3) inquiry-based; (4) student-directed; (5) collaborative; (6) interdisciplinary; (7) rigorous and hands-on; (8) embodying a culture of excellence and high expectations; (9) environmentally conscious; (10) offering strong connections to the local community and business; (11) globally networked; and (12) setting the stage for lifelong learning.
  • we still think that yesterday’s classroom equals tomorrow’s school.
  • These initiatives would not necessarily get rid of classrooms, but instead redesign and refurbish them to operate as “learning studios” and “learning suites” alongside common areas reclaimed from hallways that vastly expand available space and allow better teaching and learning.
11More

Back to School: 10 Privacy Tips for the Connected Student - 0 views

  • 1. Password-Protect Your Computer/Smartphone/Tablet
  • 2. Consider Theft-Recovery Applications
  • 3. Review Your Social Networking Privacy Settings
  • ...7 more annotations...
  • 4. Protect Your Online Reputation
  • 5. If You’re a Minor, Lock Down Your Location
  • 6. Do Your Back-to-School Shopping Securely
  • 7. Avoid Online Gossip
  • 8. Don’t Share Passwords With Friends
  • 9. Beware of Identity Theft
  • 10. Get a Lock For Your Locker/Desk/Closet
  •  
    We share and transmit a lot of personal information online. This is especially true for students, who not only use academic online tools that require personal information, but who are also incredibly active social network users. Whether a ninth grader, college senior or parent, these privacy tips can help you and your family stay safe this school year.
1More

How to remove rogue TrustSoldier - 0 views

  •  
    This article explains how to remove a fake/ rogue security application called TrustSoldier
1More

What NOT To Post On Facebook: 13 Things You Shouldn't Tell Your Facebook Friends - 78 views

  •  
    What NOT To Post On Facebook: 13 Things You Shouldn't Tell Your Facebook Friends

How Mandurah Real Estate Changed My Life - 1 views

started by Keith Sweat on 13 Jul 11 no follow-up yet

Able To Secure All Short Term Fiscal Issue - 0 views

started by Kelly Clayson on 03 Feb 16 no follow-up yet
« First ‹ Previous 281 - 300 of 359 Next › Last »
Showing 20 items per page