Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "generation" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
7More

Etiquette Returns for the Digital Generation - NYTimes.com - 0 views

    • Rivkah WC
       
      To research Daniel Post Senning existence/lineage and book existenceAuthors creditabilityJane Pratt creditabilityRandi Zuckerberg and Dot ComplicatedSteven Petrow and his contributions to the NY times
  • Steven Petrow, an author of five etiquette books including “Mind Your Digital Manners: Advice for an Age Without Rules,”
  • Their apparent goal: to help members of Generation Y navigate thorny, tech-age minefields like Paperless Post invites, same-sex weddings and online dating — not to mention actual face-to-face contact with people they encounter in the offline world.
  • ...3 more annotations...
  • No arena of modern life, it seems, is too obscure or ridiculous for consideration.
  • (Mr. Petrow is a regular contributor to The New York Times, writing an advice column on gay-straight issues for the Booming blog.)
    • Rivkah WC
       
      Daniel Post Senning existence/lineage and book existence, Authors creditability, Jane Pratt creditability, Who is Gloria Starr, Steven Petrow and his contributions to the NY times
  •  
    Original Article
15More

Digital native - Wikipedia, the free a encyclopedia - 0 views

    • ino moreno
       
      Thank you again Wikipedia!
  • a digital native as a person who understands the value of digital technology and uses this to seek out opportunities for implementing it with a view to make an impact.
  • Marc Prensky coined the term digital native in his work Digital Natives, Digital Immigrants published in 2001
  • ...9 more annotations...
    • ino moreno
       
      another reference to good ol' marc!
  • Due to the obvious divide set between digital natives and digital immigrants, sometimes both generations are forced to meet which commonly results in conflicting ideologies of digital technology. The everyday regime of worklife is becoming more technologically advanced with improved computers in offices, more complicated machinery in industry etc. With technology moving so fast it is hard for digital immigrants to keep up.
  • This creates conflicts among older supervisors and managers with the increasingly younger workforce. Similarly, parents clash with their children at home over gaming, texting, YouTube, Facebook and other Internet technology issues. The Pluralist Generation is made up of digital natives
  • Education, as Marc Prensky states, is the single largest problem facing the digital world as our Digital Immigrant instructors, who speak an outdated language (that of the pre-digital age), are struggling to teach a population that speaks an entirely new language. Immigrants suffer complications in teaching natives how to understand an environment which is "native" to them and foreign to Immigrants. Prensky's own preference to this problem is to invent computer games to teach digital natives the lessons they need to learn, no matter how serious. This ideology has already been introduced to a number of serious practicalities.
    • gb malone
       
      digital immigrant as stated by Marc Prensk
  • For example, piloting an Unmanned Aerial Vehicle (UAV) in the army consists of someone sitting in front of a computer screen issuing commands to the UAV via a hand-held controller which resembles (in detail) the model of controllers that are used to play games on an Xbox 360 game console.
    • ino moreno
       
      alot of good views on this page! once again i'm suprised wikipedia!
  • Not everyone agrees with the language and underlying connotations of the digital native.[
  • The term suggests a familiarity with technology that not all children and young adults who would be considered digital natives have, though some instead have an awkwardness with technology that not all digital immigrants have.
  • A digital native is a person who was born during or after the general introduction of digital technologies and through interacting with digital technology from an early age, has a greater understanding of its concepts.
    • gb malone
       
      explained in definition born befor or during a time on in a place
  •  
    you re from that time or era your a digital native when you are from a era before the time your a digital immigrant
2More

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
6More

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
1More

GEO Overview - GEO - NCBI - 4 views

  • General overview GEO is an international public repository that archives and freely distributes microarray, next-generation sequencing, and other forms of high-throughput functional genomics data submitted by the research community.
34More

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
2More

U.S. Copyright Office - Copyright in General (FAQ) - 0 views

  • Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works.
  • protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
2More

EBSCOhost: Educate students about consequences of online misconduct - 0 views

  • It says that college administrators are seeking ways to prevent misbehavior of students on the Internet by imposing policies on computer use. General counsel Steven McDonald from Rhode Island School of Design states that instead of creating elaborate policies and procedures, these officials should teach students the basic principles in using computer like telling them that cyberspace is not free from law.
    • Lisa Lowder
       
      This article is credible because it is posted in a professional journal and it provides quotes from Steven McDonald who is general counsel from Rhode Island School of Design.
1More

About MOOCs - 0 views

  •  
    These courses can be fully taken online. They are 'open' in the sense that they can be accessed by anyone anywhere as long as you have an internet connection, and that they are free of charge. And they are called 'massive' because generally they go for large target groups.
19More

Wireless electricity? It's here - CNN.com - 0 views

  • What's the trick?
    • troy seaton
       
      This talks about how the wireless energy works.
  • Wireless homes Don't worry about getting zapped: Hall assures that the magnetic fields used to transfer energy are "perfectly safe" -- in fact, they are the same kind of fields used in Wi-Fi routers.
    • troy seaton
       
      Plans for use in future homes, a wire-free energy tranfer throughout the homes.
  • In the house of the future, wire-free energy transfer could be as easy as wireless internet. If all goes to WiTricity's plans, smartphones will charge in your pocket as you wander around, televisions will flicker with no wires attached, and electric cars will refuel while sitting on the driveway.
  • ...11 more annotations...
  • WiTricity have already demonstrated their ability to power laptops, cell-phones, and TVs by attaching resonator coils to batteries -- and an electric car refueller is reportedly in the works.
  • World outside
    • troy seaton
       
      Other ways that this tech has been used.
  • When Hall first saw the wireless bulb, she immediately thought of medical technology -- seeing that devices transplanted beneath the skin could be charged non-intrusively.
  • WiTricity is now working with a medical company to recharge a left-ventricular assist device -- "a heart-pump essentially." The technology opens the door to any number of mobile electronic devices which have so far been held back by limited battery lives.
  • What's next? The challenge now is increasing the distance that power can be transferred efficiently. This distance -- Hall explains -- is linked to the size of the coil, and WiTricity wants to perfect the same long-distance transfers to today's small-scale devices. For this reason, the team have high hopes for their new creation: AA-sized wirelessly rechargeable batteries. For Hall, the applications are endless: "I always say kids will say: 'Why is it called wireless?'" "The kids that are growing up in a couple of years will never have to plug anything in again to charge it."
    • troy seaton
       
      Future products in development.
  • Dr Katie Hall is developing ways to transfer power without wires In the home of the future, wireless energy will be as common as Wi-Fi Internet, she believes The technology could lead to new and revolutionary medical devices
    • troy seaton
       
      Summary of the artical
  • Katie Hall
    • troy seaton
       
      the person being interviewed
  • *UPDATE (March 17)
  • It's great to see so much discussion of this technology on social media and the comments thread. There seems to be a lot of interest in the contribution of Nikola Tesla's experiments to the development of this technology. Dr Hall discussed Tesla briefly in her interview with Nick Glass: Nick Glass: Given that Tesla and others realized all this over a Century ago, why's it taken so long? Dr Hall: I don't think they realized exactly what we've done. They were certainly dreaming of wireless power -- there's no question about that. In those days, it was a different problem, because they were really thinking about: how do they get the power from where it's generated to where it's used. And in that case they might have been thinking about Niagara Falls generating the power and getting it to New York City -- and that's a long distance. We're not proposing that the technology we have here at WiTricity would be used for that kind of application. When we came around, power's already being transferred by wires to homes and rooms and things of that nature, so we had a much different problem, which was really just this much shorter distance. As WiTricity have mentioned on their website the Highly Resonant Wireless Power Transfer technology they have developed is also distinct from Tesla's creations -- and, crucially, is efficient enough to be economically viable.
    • troy seaton
       
      New update - reliable source
1More

What is collaboration? definition and meaning - 0 views

  • General: Cooperative arrangement in which two or more parties (which may or may not have any previous relationship) work jointly towards a common goal.
7More

What is privacy - 1 views

    • Jose Nieves
       
      these seem kinda helpful.
  • Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others
  • The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
  • ...3 more annotations...
    • Laura Lewis
       
      Privacy definition
    • John StClair
       
      very simple definition
    • Gage Helton
       
      Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.
    • chasidymorris
       
      Internet privacy is your right to control what happens with your personal info
1More

Digital Natives, Digital Immigrants - Some Thoughts from the Generation Gap - 0 views

    • Laura Lewis
       
      the difference between digital natives and immigrants
4More

Project Look Sharp :: K-12 & Higher Ed. Media Literacy Lesson Plans :: Ithaca College - 0 views

    • Jazz Hedrick
       
      Fact #5
  • Media Literacy Summer Institute Each year Project Look Sharp conducts an intensive media literacy institute for teachers, support staff, college faculty and other professionals working with students in an educational setting.
  • Workshops and Speakers Project Look Sharp personnel are available for large or small group presentations and workshops on a variety of media literacy topics. These range from a general introductory presentation on the use of media literacy in the classroom to topical workshops (e.g., Youth Culture and New Technologies) and trainings for current Project Look Sharp teaching kits.
  • ...1 more annotation...
  • WEBSITE AND PUBLICATIONS: Project Look Sharp publishes curriculum kits and other media literacy materials for national distribution, each using media literacy as a pedagogical approach for teaching core content in a variety of curriculum areas. The kits and materials are free and available on the website. Print copies may be ordered from our website links which direct you to the Ithaca College Bookstore.
1More

Critical Media Literacy is Not an Option | Jeff Share - Academia.edu - 0 views

    • Tony Lothes
       
      This statement helps promote teaching media litreacy to accompany education in general.
3More

EBSCOhost: Result List: AB Digital Identity - 0 views

    • Nathan Pharris
       
      Another simple definition of "Digital Identity"
  • Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to promote the use of images as the preferred idiom of a new generation of users
    • Nathan Pharris
       
      Not really a definition of "digital identity," but is a great example of how people develop their "Digital Indentity." In this In this article, this author explains how cameras are used to create a digital identity. By uploading pictures to social network sites or even "photoblogs." Each technological tool, such as cameras, inadvertently helps create an online presents.
5More

Malware Definition - 1 views

    • Malcolm Jackson
       
      Interesting!
  • Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.
    • Nathan Pharris
       
      Malware refers to internet viruses in general.
    • Nathan Pharris
       
      Here are some examples of Malware.
  •  
    Note my definition of "Malware," is highlighted in green.
7More

Digital Literacy: New Literacy? - Forbes - 0 views

  • We live in a dynamic world where skills, and not degrees, are our access, not our assets
  • New education platforms that democratize access to all forms of higher learning impact, and advance, humanity.
  • Alice Brooks out of Stanford, is manufacturing modular dollhouses that are not only making technology and engineering fun, but also empowering girls.
  • ...3 more annotations...
  • First, the norms around elite educational access are changing, and some of the Ivy walls are coming down with regard to sharing access to elite institutions and academics. iTunesU allowed
  • Khan Academy,
  • Where such toys and tools impel a new demographic toward technology, these platforms are truly bringing down the costs of technical literacy, and insofar as this has positive impact, they are accretive to society
  •  
    Something I found on Forbes describing this generation.
3More

Defining Critical Thinking - 0 views

  • Critical thinking...the awakening of the intellect to the study of itself. Critical thinking is a rich concept that has been developing throughout the past 2500 years.  The term "critical thinking" has its roots in the mid-late 20th century. 
  • Critical thinking is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action. In its exemplary form, it is based on universal intellectual values that transcend subject matter divisions: clarity, accuracy, precision, consistency, relevance, sound evidence, good reasons, depth, breadth, and fairness
    • Katrina Quick
       
      Critical thinking is the intellectually disciplined process of actively and skillfully making concepts, analyzing synthesizing and evaluating information.
2More

TILE-SIG Feature: Back to School with Multimodality - 0 views

  • simply means the ability to create and read a variety of modes of communication.
  • Approaching literacy in multimodal ways emphasizes the many ways that individuals can communicate their ideas.
1 - 20 of 38 Next ›
Showing 20 items per page