Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged be

Rss Feed Group items tagged

deborahnolan74

Shibboleth Authentication Request - 5 views

    • Jackie Davidson
       
      Twitter shares up-this article gave more content and information.
    • Joshua Whitley
       
      10 Currency-Not current, no updates, can be used in classroom setting 7 Content is credible. the story can be useful to students to educate. The information is valid.  8 Authority- Authors' names are at the top of article, no links to contact author, Authors' Occupation is visible 7 Navigation-No links relevant to topic. everything clear and readable,  10 Experience-Fulfills it's intended purpose.  very engaging to me.  0 Multimedia-no multimedia  7 Treatment- Bias toward Democrats,   6 Access-Easy to access page, no relevant links to help further investigate,    7 Miscellaneous-no per-use cost, no inquiring of private info, can be printed with no issues 
    • troy seaton
       
      WiTricity Corporation make devices that allows wireless charging.
  • WiTricity is also developing technology for wireless charging of electric vehicles and, later, for use in implanted medical devices like heart pumps, said Katie Hall, its chief technology officer.
  • ...6 more annotations...
  • The technology is based on magnetic induction -- the process used to recharge electric toothbrushes. In the toothbrush, the base has a magnetic coil that generates a magnetic field. A second coil in the toothbrush captures some of that field, inducing an electric current.But electric toothbrushes transfer power only from the primary coil to the secondary one at very close range. Move the brush a short distance from the base, and it won't charge.
  • WiTricity has signed a technology transfer and licensing agreement with MediaTek, a semiconductor company in Taiwan, to collaborate on systems for wireless charging of mobile handsets, tablet computers, game controllers and other devices, Mr. Giler said.
    • troy seaton
       
      Other devices that are development
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
  •  
    AFP - RELAXNEWS (English International Version) Two film stars, Michael Douglas and Paul Rudd, are to share the title role in the next film from "The World's End" director Edgar Wright, due 2015. After Robert Redford's stint in "Captain America: The Winter Soldier," Marvel has recruited another legendary actor for an upcoming blockbuster in Michael Douglas. The 69-year-old will become the face of Henry Pym and hand over the Ant-Man moniker to Scott Lang, the new hero played by Paul Rudd. Ant-Man first appeared in print in 1962 and has become the alter ego for a number of Marvel characters; the film sees Lang succeed Pym as the electronics whizz in charge of wearing the Ant-Man mantle, able to shrink, grow, and communicate with insects. Dated for July 31, 2015, "Ant-Man" should also result in the character's addition to the supporting cast of the next Avengers film, set for mid-2018.
  •  
    Adknowledge is a leading digital marketing company working with some of the worldâs top brands. Adknowledge designs, manages and measures campaigns for companies including Audi, Starbucks, LG, Disney and LâOréal to unlock digital audiences using multiple channels: social media, mobile, apps, email, display ads and audience engagement. A proprietary database of more than 600 million internet and mobile users steers Adknowledgeâs targeting; user preferences, online behavior and unsurpassed optimization ensure surgical message precision. In addition, Adknowledge helps publishers monetize their sites and lists effectively, with great attention to contextual relevance. Since it was founded 2004, Adknowledge has grown organically and through acquisitions. This includes a 2011 purchase of Toronto-based AdParlor, one of the first Facebook Strategic Preferred Marketing Developers (sPMD). Adknowledge is based in Kansas City, Missouri; it also has North American offices in San Francisco, New York Fort Myers and Toronto. It has overseas locations in London, Paris, Munich and Shanghai with sales presence in Australia and Brazil. Today, there are approximately 300 Adknowledge employees located around the world.
gb malone

Nine Elements of Digital Citizenship - 3 views

    • yanika scotton
       
      1. Digital Access:   full electronic participation in society. 2. Digital Commerce:   electronic buying and selling of goods. 3. Digital Communication:   electronic exchange of information. 4. Digital Literacy:   process of teaching and learning about technology and the use of technology. 5. Digital Etiquette:   electronic standards of conduct or procedure. 6. Digital Law:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
    • Roberto Dunn
       
      one page, lots of useful information!
  • In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • ...22 more annotations...
  • Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
  • Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
  • We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
  • Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
  • It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
  • Digital law deals with the ethics of technology within a society.
  • Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
  • Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
  • Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.
  • Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
  • In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
    • gb malone
       
      digital security teaches us that we need protection at all times. ex{ virus protectionvirus protection
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
    • ino moreno
       
      Great notes guys!!:)
  • precautions
  • safety
  • safety
  • Digital Literacy:   process of teaching and learning about technology and the use of technology.
    • Katrina Quick
       
      to be taught, or to learn about technology and how to use it.
    • Nathan Pharris
       
      "Digital Citizenship" is refferenced in this passage. To be a "Digital Citizen" one must gain "electronic access."
  • Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
  • digital rights and supporting electronic access is the starting point of Digital Citizenship
    • Nathan Pharris
       
      Another example of what makes us a "Digital Citizen."
    • DeJuan Griggs
       
      An Example of the way you should conduct yourself in a digital environment 
  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • Gabrielle Yoder
       
      definition of digital citizenship
  •  
    Digital Citezenship
deborahnolan74

Nine Elements - 1 views

  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • hunta3454
       
      The basic definition of Digital Literacy
  • full electronic participation in society. Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.
  • electronic buying and selling of goods. Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling
  • ...11 more annotations...
  • full electronic participation in society. Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.
  • Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.
  • full electronic participation in society.
  • electronic exchange of information.
  • process of teaching and learning about technology and the use of technology.
  • electronic standards of conduct or procedure
  • electronic responsibility for actions and deeds
  • those freedoms extended to everyone in a digital world.
  • physical and psychological well-being in a digital technology world.
  • electronic precautions to guarantee safety.
  • electronic precautions to guarantee safety.
  •  
    Digital Citizenship:  Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.                                                                   Mike Ribble
  • ...1 more comment...
  •  
    Digital Citizenship:  Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.                                                                   Mike Ribble
Reshunda Pickens

Lance's life: Travel, kids, golf handicap 'down to a 9' - 0 views

    • Reshunda Pickens
       
      The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. N/A  The information on the topic is thorough. Yes  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 15  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. Yes  There is a way to contact the author (s) via e-mail or traditional mail. Yes  You can easily tell from the domain name where the page originates. Yes  Total: 10  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10  Mul
  •  
    Lance Armstrong is the athlete who came out with the shocking news that he cheated for his Tour de France wins. This is the state of his life a year after. The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. N/A The information on the topic is thorough. Yes The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 15 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time.
Reshunda Pickens

Obama to propose key changes in data collection program - NBC Politics - 0 views

    • Reshunda Pickens
       
      The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. No  The information on the topic is thorough. No  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 10.7  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. No  There is a way to contact the author (s) via e-mail or traditional mail. No  You can easily tell from the domain name where the page originates. Yes  Total: 5  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10 
  •  
    The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 10.7 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. No There is a way to contact the author (s) via e-mail or traditional mail. No You can easily tell from the domain name where the page originates. Yes Total: 5 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Multimedia (0 to 10 P
ino moreno

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
troy seaton

Wireless electricity? It's here - CNN.com - 0 views

  • What's the trick?
    • troy seaton
       
      This talks about how the wireless energy works.
  • Wireless homes Don't worry about getting zapped: Hall assures that the magnetic fields used to transfer energy are "perfectly safe" -- in fact, they are the same kind of fields used in Wi-Fi routers.
    • troy seaton
       
      Plans for use in future homes, a wire-free energy tranfer throughout the homes.
  • In the house of the future, wire-free energy transfer could be as easy as wireless internet. If all goes to WiTricity's plans, smartphones will charge in your pocket as you wander around, televisions will flicker with no wires attached, and electric cars will refuel while sitting on the driveway.
  • ...11 more annotations...
  • WiTricity have already demonstrated their ability to power laptops, cell-phones, and TVs by attaching resonator coils to batteries -- and an electric car refueller is reportedly in the works.
  • World outside
    • troy seaton
       
      Other ways that this tech has been used.
  • When Hall first saw the wireless bulb, she immediately thought of medical technology -- seeing that devices transplanted beneath the skin could be charged non-intrusively.
  • WiTricity is now working with a medical company to recharge a left-ventricular assist device -- "a heart-pump essentially." The technology opens the door to any number of mobile electronic devices which have so far been held back by limited battery lives.
  • What's next? The challenge now is increasing the distance that power can be transferred efficiently. This distance -- Hall explains -- is linked to the size of the coil, and WiTricity wants to perfect the same long-distance transfers to today's small-scale devices. For this reason, the team have high hopes for their new creation: AA-sized wirelessly rechargeable batteries. For Hall, the applications are endless: "I always say kids will say: 'Why is it called wireless?'" "The kids that are growing up in a couple of years will never have to plug anything in again to charge it."
    • troy seaton
       
      Future products in development.
  • Dr Katie Hall is developing ways to transfer power without wires In the home of the future, wireless energy will be as common as Wi-Fi Internet, she believes The technology could lead to new and revolutionary medical devices
    • troy seaton
       
      Summary of the artical
  • Katie Hall
    • troy seaton
       
      the person being interviewed
  • *UPDATE (March 17)
  • It's great to see so much discussion of this technology on social media and the comments thread. There seems to be a lot of interest in the contribution of Nikola Tesla's experiments to the development of this technology. Dr Hall discussed Tesla briefly in her interview with Nick Glass: Nick Glass: Given that Tesla and others realized all this over a Century ago, why's it taken so long? Dr Hall: I don't think they realized exactly what we've done. They were certainly dreaming of wireless power -- there's no question about that. In those days, it was a different problem, because they were really thinking about: how do they get the power from where it's generated to where it's used. And in that case they might have been thinking about Niagara Falls generating the power and getting it to New York City -- and that's a long distance. We're not proposing that the technology we have here at WiTricity would be used for that kind of application. When we came around, power's already being transferred by wires to homes and rooms and things of that nature, so we had a much different problem, which was really just this much shorter distance. As WiTricity have mentioned on their website the Highly Resonant Wireless Power Transfer technology they have developed is also distinct from Tesla's creations -- and, crucially, is efficient enough to be economically viable.
    • troy seaton
       
      New update - reliable source
chris mackie

Westboro Baptist Church founder Fred Phelps Sr. 'on the edge of death' - NY Daily News - 0 views

    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
    • chris mackie
       
      1) Content - The intent of the content was to demonstrate the encroaching illness of Rev Fred Phelps. 2) Credibility - This seems to be a fairly credible source as the write (Doyle Murphy) also writes for the New York Daily News. 3) Critical Thinking - I am familiar with Rev Fred Phelps SR. from watching the protests of his church group on the internet. That being said, I have also seen numerous false death reports. Because of his (and his organization') reputation it is possible that someone is lying to create disbelief. 4) Copyright - The site itself was copyrighted in 2013, but this article itself was uploaded Sunday, March 16, 2014, 1:53 PM 5) Citation - This article includes citations from where it received the information and pictures. They also provide links in the article to easily access the original text. 6) Continuity - This article can be updated but only by the site admins itself. That means that it most likely has the most accurate information. 7) Censorship - This article appears completely uncensored. It includes some graphic language and images. Because of these points I can deduce that the facts are not altered. Also there is a moderated comments section but those posts appear uncensored 8) Connectivity - The site was easy to find and navigate to. It can handle multiple users at a time without issue. It contains links to the other parts of the page depending on if you want to continue reading on a different topic. 9) Comparability - I checked a couple different websites to see if they had a similar article. And they do. By checking other sites I can confirm that this is most likely a fact. 10) - Context - The context in this article tries very hard to just be neutral and factual about a man with such a horrible reputation. It does so decently, but the comments at the bottom do not. They are as inflammatory as some of the protest signs Fred Phelps is commonly known for. Web Page Evaluation: Currency - 10, Content
Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
anthony chaney

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  •  
    "Directions: Use your judgment in allotting points for the various categories. Total the points for score. Currency (0 to 15 Points) The site has the date of last revision posted. The site has been updated recently. Frequency of planned updates and revisions is stated. Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. This information is not available in any other format elsewhere in my library. The information on the topic is thorough. The information is accurate. The purpose of the page is obvious. The information is in good taste. The page uses correct spelling and grammar. Authority (0 to 10 Points) The authors are clearly identified. The authors and/or maintainers of the site are authorities in their field. There is a way to contact the author (s) via e-mail or traditional mail. You can easily tell from the domain name where the page originates. Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. The type styles and background make the page clear and readable. The links are easy to identify. The links are logically grouped. The layout is consistent from page to page. There is a link back to the home page on each supporting page. The links are relevant to the subject. The icons clearly represent what is intended. Experience (0 to 10 Points) The page fulfills its intended purpose. The page is worth the time. The page's presentation is eye-catching. The site engages the visitor to spend time there. Multimedia (0 to 10 Points) Sound, graphics or video enhance the site's message. Treatment (0 to 10 Points) Any biases towards the subject matter can be easily identified. The page is free from stereotyping. The page is age appropriate for content and vocabulary for its intended audience. Access (0 to 5 Points) You can connect quickly to the page. The page is available through search engines. The page loads quickly. You can choose whether to download small
Joey Martinez

Privacy - 0 views

  • The quality of being secluded from the presence or view of others
  • The condition of being concealed or hidden
  •  
    The quality of being secluded from the presence or view of others & The condition of being concealed or hidden.
  •  
    The quality of being secluded from the presence or view of others & The condition of being concealed or hidden.
Joey Martinez

Academic Integrity - 1 views

  • The definition of academic integrity is fulfilling your academic requirements with trust and being honest about your responsibilities. It is being fair throughout the academic community.
  •  
    The definition of academic integrity is fulfilling your academic requirements with trust and being honest about your responsibilities. It is being fair throughout the academic community.
  •  
    The definition of academic integrity is fulfilling your academic requirements with trust and being honest about your responsibilities. It is being fair throughout the academic community.
chris mackie

Heineken Beer Makers Join Sam Adams In Dropping Out Of St. Patrick's Day Parade Over Ga... - 0 views

    • chris mackie
       
      1) Content - The content on this page is good. It can be easily read and understood. The layout allows it to be read while still adding adds for other related articles. It was uploaded 3/15 and updated later the same day. 2) Credibility - The Author itself I'm not familiar with, but it also appears to be an article by Reuters. Reuters is an organization that a lot of news agencies use and are widely trusted. 3) Critical Thinking - Because of their references and ties to Reuters you can with most certainly use critical thinking to assume this page is legitimate. 4) Copyright - The website it's self only says 2014 for the copyright. But this article itself was uploaded 3/15/14. Because of their copyright it can be assumed that this article is covered by it. 5) Citation - They do use some outside images and the text itself is from Reuters. But they credit them on the page so there is no infringement. 6) Continuity - This page can only be physically edited by the Huffington Post staff. So the continuity is withheld without errors. 7) Censorship - Because this page is moderated by Huffington post themselves there is a chance that it is edited. Also the comments system seem to be moderated in the regard that you can post what you want but if you offend someone the site admin can take it down. 8) Connectivity - The connectivity to the page is good. Many users can access it at the same time and it can be used as a jumping off point to either paid supported products or additional articles written by Huffington Post. 9) Comparability - You could take the information on this page and check it against numerous sources. I checked Google and came up with many results that either cite the beginning article or copy this article directly. 10) - Context - The context of this page is really good. They maintain the stance that Heineken and Sam Adams are taking without passing judgment, in support or not, for either the companies or the parade organize
anonymous

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
Joey Martinez

Digital literacy - 0 views

  • The ability to locate, organize, understand, evaluate, and analyze information using digital technology.
  • Digitally literate people can communicate and work more efficiently, especially with those who possess the same knowledge and skills.
    • Brittni Roddin
       
      Very Helpful. Thank you.
  • A person using these skills to interact with society may be called a digital citizen.
  • ...3 more annotations...
    • Katrina Quick
       
      The ability to understand information and technology
    • Jason Parker
       
      I really like the defenitions here as well as Alvin Tofflers's quote at the bottom of the page. I find it both true and a little bit sad and troubling, as it seems more likely the truth with today's and the future's society
  • It involves a working knowledge of current high-technology, and an understanding of how it can be used.
    • Joey Martinez
       
      I believe to be literate one shoud be able to understand a certain type of information, as to be digitally literate then one should be able to understand information provided by todays digital world.
    • Joey Martinez
       
      The definition of Digital Literacy is in the first text box quoted by Author Paul Gilister.
  •  
    Digital Literacy definition #2
  • ...6 more comments...
  •  
    Digital Literacy definition #2
  •  
    Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver.
  •  
    Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver.
  •  
    Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver.
  •  
    Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver. Digital Literacy: The awareness, attitude and ability of individuals to appropriately use digital tools and facilities to identify access, manage, integrate, evaluate, analyze and synthesize digital resources, construct new knowledge, and create media. http://cleach.wordpress.com/what-is-digital-literacy/
  •  
    1. Digital Literacy: Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver. http://cleach.wordpress.com/what-is-digital-literacy/ Paul Gilister Digital Literacy: The awareness, attitude and ability of individuals to appropriately use digital tools and facilities to identify access, manage, integrate, evaluate, analyze and synthesize digital resources, construct new knowledge, and create media. http://cleach.wordpress.com/what-is-digital-literacy/
  •  
    Digital Literacy: Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver. http://cleach.wordpress.com/what-is-digital-literacy/ Paul Gilister Digital Literacy: The awareness, attitude and ability of individuals to appropriately use digital tools and facilities to identify access, manage, integrate, evaluate, analyze and synthesize digital resources, construct new knowledge, and create media. http://cleach.wordpress.com/what-is-digital-literacy/
  •  
    Digital Literacy: Digital Literacy is the ability to understand information and to evaluate and integrate information in multiple formats that the computer can deliver. http://cleach.wordpress.com/what-is-digital-literacy/ Paul Gilister
chris mackie

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
chris mackie

Malaysia Airlines Flight 370 search grows, pilots face scrutiny - CNN.com - 0 views

    • chris mackie
       
      1) Content - The content in this article is remarkably good. It seems fair and unbiased and is written as a serious post. It provides details on the facts and the mysterious circumstances surrounding the loss of this plane 2) Credibility - CNN by itself is a reliable source. But also they provide links to outside articles on the page to corroborate their posting of the story. 3) Critical Thinking - Based on the information in the article you can deduce a lot about the plane and the issues with the search. I helps you think by mentioning important details and providing links to search for more information. 4) Copyright - This page itself was copyrighted in 2014. This article itself was posted on Sun March 16th, 2014. Meaning that it was updated today. 5) Citation - This site cites its references and provides links to them for additional information. 6) Continuity - Because of CNN's informational network this site can be updated within hours if not minutes. This up to date information provides room for new information to enter the article. 7) Censorship - This is posted and maintained by CNN so there is most likely some degree of censorship. But the comments can be posted immediately. However, if your post is tagged as offensive they will remove it. 8) Connectivity - This site is vastly interconnected both with corresponding articles on CNN.com and outside articles. It's easy to use and Easy to navigate. 9) Comparability - This page can be compared to many other pages. In fact, this article is the center of many websites referencing its information for reposting. 10) - Context - The scope of this page in context is a little biased. It tries to hint at the fact that the plane could have been hijacked and focuses on that speculation only giving a slight reference that the Ministry of Transportation has said that they aren't pursuing it that way but are looking into all of the information on why it deviated. Web Page Evaluation: Cur
    • chris mackie
       
      1) Content - The content in this article is remarkably good. It seems fair and unbiased and is written as a serious post. It provides details on the facts and the mysterious circumstances surrounding the loss of this plane 2) Credibility - CNN by itself is a reliable source. But also they provide links to outside articles on the page to corroborate their posting of the story. 3) Critical Thinking - Based on the information in the article you can deduce a lot about the plane and the issues with the search. I helps you think by mentioning important details and providing links to search for more information. 4) Copyright - This page itself was copyrighted in 2014. This article itself was posted on Sun March 16th, 2014. Meaning that it was updated today. 5) Citation - This site cites its references and provides links to them for additional information. 6) Continuity - Because of CNN's informational network this site can be updated within hours if not minutes. This up to date information provides room for new information to enter the article. 7) Censorship - This is posted and maintained by CNN so there is most likely some degree of censorship. But the comments can be posted immediately. However, if your post is tagged as offensive they will remove it. 8) Connectivity - This site is vastly interconnected both with corresponding articles on CNN.com and outside articles. It's easy to use and Easy to navigate. 9) Comparability - This page can be compared to many other pages. In fact, this article is the center of many websites referencing its information for reposting. 10) - Context - The scope of this page in context is a little biased. It tries to hint at the fact that the plane could have been hijacked and focuses on that speculation only giving a slight reference that the Ministry of Transportation has said that they aren't pursuing it that way but are looking into all of the information on why it deviated. Web Page Evaluation: Cur
ino moreno

The 25 Rules of Disinformation - The Vigilant Citizen - 1 views

    • ino moreno
       
      Interesting article!!!!!!
  • The Rules of Disinformation
  • 1. Hear no evil, see no evil, speak no evil.
  • ...29 more annotations...
  • 2. Become incredulous and indignant.
  • 3. Create rumor mongers.
  • 4. Use a straw man.
    • ino moreno
       
      seems like a "how to be evil" step by step!
  • Sidetrack opponents with name calling and ridicule.
  • 6. Hit and Run. I
  • 7. Question motives.
  • 8. Invoke authority.
  • 9. Play Dumb.
  • 10. Associate opponent charges with old news.
  • 11. Establish and rely upon fall-back positions.
  • 12. Enigmas have no solution.
  • 13. Alice in Wonderland Logic.
  • 14. Demand complete solutions.
  • 15. Fit the facts to alternate conclusions.
  • 16. Vanishing evidence and witnesses.
  • 17. Change the subject.
  • 18. Emotionalize, Antagonize, and Goad Opponents.
  • 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  • 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution.
  • 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
  • 22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
  • leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  • 23. Create bigger distractions.
  • 24. Silence critics.
  • sh. If you are a key holder of secrets or otherwise overly illuminated and you
  • think the heat is getting too hot, to avoid the issues, vacate the kitchen.
  • 25. Van
    • ino moreno
       
      WOW! what an interesting read!
deborahnolan74

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
darcy gill

Being a Digital Native Isn't Enough | Guest Blog, Scientific American Blog Network - 0 views

  • never realized how hard it would be to limit my toddler’s screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it “my phone” and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is “supposed” to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology–and it is intuitive and easy to navigate. One of our friend’s children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
  •  
    I never realized how hard it would be to limit my toddler's screen time. Despite my efforts, he has developed a proficiency with my iPhone that is, as far as I can tell, standard for his peers. He has even taken to calling it "my phone" and is flummoxed when the old solar calculator that was given to him as a plaything does not do what it is "supposed" to do (i.e., play music, play games, make calls, etc.). Whether it is through a phone, a tablet, a laptop, or a television, kids can do so many things with technology-and it is intuitive and easy to navigate. One of our friend's children even tried swiping at a magazine page, and was frustrated when it did not turn electronically.
1 - 20 of 194 Next › Last »
Showing 20 items per page