Skip to main content

Home/ Classroom 2.0/ Group items tagged data

Rss Feed Group items tagged

Martin Burrett

The Great Brain Experiment - 0 views

  •  
    This is a fun Android and Apple app from University College London were players complete a range of games to exercise the brain cells and provide researchers with real, but anonymous data to use in their study. http://ictmagic.wikispaces.com/Science
Peter Horsfield

Extraordinary People - Timothy Hwang - 0 views

  •  
    Timothy Hwang is a young businessman, philanthropist, entrepreneur and politician who is most popular for founding the National Youth Association, a nationwide organization in the United States that focuses on youth advocacy; the National Youth Lobby: and FiscalNote, a highly-ranked data analytics firm. What is so amazing about him is that he established these organizations and businesses at a young age, and is currently named as a rising star in politics in the United States.
Fatima Anwar

The Integrated Learning Platform: Cardiff Univeristy - Cardiff is everything a good uni... - 0 views

  •  
    Cardiff University is recognized in independent government tests as one of The British leading educating and analysis colleges. Established by Royal Charter in 1883, the University today brings together impressive modern facilities and a powerful approach to educating and analysis with its proud culture of service and accomplishment. Cardiff University is the biggest University of mature education and learning in Wales, with the Cardiff Center for Long term Studying offering several hundred programs in locations across Southern Eastern Wales. The University's lifelong learning actions also include the professional growth work performed by educational institutions for companies, and many of these is custom-made to match an individual business's needs. The Center also provides business terminology training at all levels. Founded: 1883. Structural features: Merged with University of Wales College of Medicine (UCWM) in 2004. Location: Close to Cardiff city center. Healthcare care learners also at hospital website, Heath Recreation area University, 1 mile away. Getting there: Cardiff Primary Place on the national train network; trainers to bus station (next to train station); M4 from London and M5 (west county and Midlands). For school, frequent teaches from Primary Place to Cathays station (on campus), regional vehicles from bus station (53, 79, 81 for main campus; 8 or 9 for hospital site). Academic features: 4-year incorporated food techniques, 5-year two-tier techniques in structure and town planning. 5-year medical and dental programs, plus foundation season for those without science backgrounds; medical teaching throughout Wales. Awarding body: Cardiff University; Wales University for some healthcare programs. Main undergrad awards: BA, BD, BDS, BMus, BN, BSc, BEng, BScEcon, LLB, BArch, MB BCh, MPhys, MChem, MEng, MPharm. Length of courses: 3 years; others 4 and 5 decades. Library & IT facilities: Integrated collection,
anonymous

Beware of/ Remove Banking Trojan ZBot file ubce.exe - 0 views

  •  
    It is a banking trojan that disables firewall, steals sensitive financial data (credit card numbers, online banking login details),Coins-64x64 makes screen snapshots, downloads additional components, and provides a hacker with the remote access to the infected computer
anonymous

How to remove a zbot trojan file ibur.exe - 0 views

  •  
    It is a banking trojan that disables firewall, steals sensitive financial data (credit card numbers, online banking login details), makes screen snapshots, downloads additional components, and provides a hacker with the remote access to the infected computer.
Maggie Verster

Online Learning In The Social Web: social media, web2.0, elearning, education - 25 views

  •  
    "Great presentation about social software in education! With case-study and data form students opinons! "
J Black

Wellcome-images - 0 views

  •  
    Database of images from museum in England. Licensed under Creative Commons - must attribute and also leave embedded meta data in file information. Some very nice images!!
Carlos Quintero

W3C Semantic Web Activity - 0 views

  •  
    W3C Semantic Web Activity The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. It is a collaborative effort led by W3C with participation from a large number of researchers and industrial partners. It is based on the Resource Description Framework (RDF). See also the separate FAQ for further information.
Tom Daccord

Pew Internet: Riding the Waves of "Web 2.0" - 0 views

  •  
    "Web 2.0" has become a catch-all buzzword that people use to describe a wide range of online activities and applications, some of which the Pew Internet & American Life Project has been tracking for years. As researchers, we instinctively reach for our spreadsheets to see if there is evidence to inform the hype about any online trend. This article provides a short history of the phrase, along with new traffic data from Hitwise to help frame the discussion.
cheryl capozzoli

OpenCongress - Track bills, votes, senators, and representatives in the U.S. Congress - 0 views

shared by cheryl capozzoli on 26 Oct 08 - Cached
  •  
    OpenCongress brings together official government data with news and blog coverage to give you the real story behind each bill.
Walter Antoniotti

Excel Statistics Lab Manual - 0 views

  •  
    Free Internet lab manual for the free Internet textbook Statistics using The Quick Notes Learning System. Problems are in column A with directions on how to do them. Data is in column B as is a place for Excel to put the answer. User follows the directions, answers are generated by Excel, user interprets the answer. Complete solution provided in the next worksheet.
Maggie Verster

World Map of Social Networks - 0 views

  •  
    A map of the world, showing the most popular social networks by country, according to Alexa & Google Trends for Websites traffic data (June 2009). Please share and help me to improve it with your comments !
Steve Ransom

Leaving 'Friendprints': How Online Social Networks Are Redefining Privacy and Personal ... - 0 views

  • "Our kids today will give everything [in terms of personal information] away, but it's not at all clear how this will shake out in the long run,"
    • Steve Ransom
       
      A marketer's gold mine, among other things.
  • And what about the person you don't really know who wants to be your friend because you have some friends in common? According to Hoffman, that new friend may just be mining your social circle for information. As networks grow and more friends of friends (and their friends) are accepted by users, it's unclear who can be trusted.
    • Steve Ransom
       
      Hmmmm... this has occurred to me before, but I'm not sure how real it is our how paranoid we should be. However, we do need to take a look at our followers' digital footprints (blogs, tweets, posts, pages,...) if suspect.
  • Hoffman illustrated how social connections are made online and the ease with which a stranger can become part of a network.
  • ...5 more annotations...
  • When a business contact from the LinkedIn world wants to become your friend on Facebook, do you accept the invitation, giving them access to the photos on your Facebook profile from last summer's rowdy beach party?
  • Third-party applications, he argued, can take that data outside of the friendly confines of a social networking site and combine it with data from other sources to piece together enough information to steal a person's identity.
    • Steve Ransom
       
      That's always been my feeling about 3rd party apps. I don't use them for the most part.
  • According to Acquisti, people are more likely to divulge key personal information -- their photo, birthday, hometown, address and phone number -- on social networking sites than they would on other web sites
  • In one study, Acquisti found that that people will divulge information when they see others doing so. That tendency, he believes, may explain why so many people are willing to dish out personal information on the networks.
  • Holy Grail for marketers is to track consumers and their friends -- and what they say about a product -- via social networks. "People are more willing to divulge information for social purposes, and the lead users are 18 to 25 years old," Bradlow notes. "The social norms around privacy aren't going to be what they were before."
  •  
    The information provides opportunities not only for legitimate business purposes, but also for the nefarious aims of identity thieves and other predators, according to faculty at Wharton and elsewhere.
bethany rebecca

Is Your Cell Phone Spying on You? - 0 views

  •  
    1) Phone is unusually warm even though you haven't been using it-- could indicate unauthorized transmissions. 2) Battery life drops dramatically, for no reason-- could indicate surreptitious communication. 3) Screen flashes on and off, without cause-- could indicate an incoming spy call. 4) Monthly bill shows an unwarranted spike in SMS or data transmission activity-- could indicate your phone is being accessed without your knowledge.
bethany rebecca

Disabling System Restore to remove viruses - 0 views

  •  
    Windows ME and Windows XP both come with a characteristic known as System Restore that enables users to revert to specific restore points without impacting data files. When new drivers or software are installed, the operating system automatically creates a restore point. If the installation causes problems, the system restore point can be used to rollback the changes. If no driver or software installations occur, System Restore will automatically create a restore point daily.
cheryl capozzoli

Data.gov - 0 views

shared by cheryl capozzoli on 22 May 09 - Cached
Kathleen N liked it
  •  
    public access to high value, machine readable datasets generated by the Executive Branch of the Federal Government
« First ‹ Previous 121 - 140 of 360 Next › Last »
Showing 20 items per page