A team of MIT professors then developed what they call “resonant power transfer,” in which a power coil is able to wirelessly transfer electricity to another device containing a similar coil set to the same frequency.
Group items matching
in title, tags, annotations or url
2More
9More
shared by troy seaton on 17 Mar 14
- No Cached
Wireless electricity to soon power cell phones, cars, heart pumps - 0 views
www.dailytimes.com.pk/...r-cell-phones-cars-heart-pumps
cell phones wireless electricity power cell pumps phones cars heart
![](/images/link.gif)
-
-
-
For example, in February, Toyota announced it began testing a wireless recharging station for its hybrid cars in which the vehicle would power up by parking over a charging pad on the ground.
- ...4 more annotations...
-
-
Giles says that if the hurdle of transferring electricity over greater physical distances can be crossed, then wireless electricity would quickly replace the world of cables. And after the technology is in place, manufacturers would then have to install the equipment allowing for the wireless electric transfer to take place.
-
3More
Wireless electricity may soon power cell phones, cars and even heart pumps | The Sidesh... - 0 views
-
WiTricity CEO Eric Giler demonstrated the company’s technology during a TED talk, in which he explained, “This all came from a professor waking up at night to the third night in a row that his wife’s cell phone was beeping because it was running out of battery power. And he was thinking, ‘With all of the electricity that’s out there in the walls, why couldn’t some of that just come into the phone so I could get some sleep?’”
-
A team of MIT professors then developed what they call “resonant power transfer,” in which a power coil is able to wirelessly transfer electricity to another device containing a similar coil set to the same frequency.
14More
Digital literacy - Wikipedia, the free encyclopedia - 0 views
-
"to recognize and use that power, to manipulate and transform digital media, to distribute pervasively, and to easily adapt them to new forms"
-
Research around digital literacy is concerned with wider aspects associated with learning how to effectively find, use, summarize, evaluate, create, and communicate information while using digital technologies; not just being literate at using a computer.
- ...7 more annotations...
-
-
-
Digital literacy researchers explore a wide variety of topics, including how people find, use, summarize, evaluate, create, and communicate information while using digital technologies. Research also encompasses a variety of hardware platforms, such as computer hardware, cell phones and other mobile devices and software or applications, including web search or Internet applications more broadly. As a result, the area is concerned with much more than how people learn to use computers. In Scandinavian English as well as in OECD research, the term Digital Competence is preferred over literacy due to its holistic use. A digitally literate person may be described as a digital citizen.
2More
Digital Literacy - 0 views
-
digital literacy means basic comfort and competence in using computers, smart phones, electronic tablets, and other web-accessible devices.
16More
Issues to Consider When Implementing Digital and Media Literacy Programs | KnightComm - 0 views
-
-
concern is whether people will be able to transfer their self-developed digital skills beyond their affinity groups, fan communities or local social cliques.
-
, we should not assume they are digitally literate in the sense that we are discussing it here (Vaidhyanathan, 2008).
- ...12 more annotations...
-
For young people today, it is vital that formal education begin to offer a bridge from the often insular and entertainment-focused digital culture of the home to a wider, broader range of cultural and civic experiences that support their intellectual, cultural, social and emotional development.
-
-
simply buying computers for schools does not necessarily lead to digital and media literacy education. Schools have a long way to go on this front. Access to broadband is a substantial issue as diffusion is uneven across American cities and towns (Levin, 2010).
-
andatory Internet filtering in schools means that many important types of social media are not available to teachers or students. And though there are computers with Internet access in most classrooms, fewer than half of American teachers can display a website because they do not have a data projector available to them.
-
Many American parents mistakenly believe that simply providing children and young people with access to digital technology will automatically enhance learning.
-
the “soccer mom” has been replaced by the “technology mom” who purchases a Leapfrog electronic toy for her baby, lap-surfs with her toddler, buys a Wii, an xBox and a Playstation for the kids and their friends, puts the spare TV set in the child’s bedroom, sets her child down for hours at a time to use social media like Webkinz and Club Penguin, and buys a laptop for her pre-teen so she will not have to share her own computer with the child.
-
In many American homes, the computer is primarily an entertainment device, extending the legacy of the television, which is still viewed for more than 3 hours per day by children aged 8 to 18, who spend 10 to 12 hours every day with some form of media (Kaiser Family Foundation, 2010). The computer is used for downloading music, watching videos, playing games and interacting on social networks.
-
-
Content risks – This includes exposure to potentially offensive or harmful content, including violent, sexual, sexist, racist, or hate material. Contact risks – This includes practices where people engage in harassment, cyber bullying and cyber stalking; talk with strangers; or violate privacy. Conduct risks – This includes lying or intentionally misinforming people, giving out personal information, illegal downloading, gambling, hacking and more.
-
For example, when it comes to sexuality, both empowerment and protection are essential for children, young people and their families. Young people can use the Internet and mobile phone texting services to ask difficult questions about sexuality, get accurate information about sexual heath and participate in online communities. The Internet also enables and extends forms of sexual expression and experimentation, often in new forms, including webcams and live chat. Pornography is a multibillion dollar industry in the United States. In a country with the highest teenage pregnancy rate of all Western industrialized countries in the world, a recent report from the Witherspoon Institute (2010) offers compelling evidence that the prevalence of pornography in the lives of many children and adolescents is far more significant than most adults realize, that pornography may be deforming the healthy sexual development of young people, and that it can be used to exploit children and adolescents. Teens have many reasons to keep secret their exposure to pornography, and many are unlikely to tell researchers about their activities. But about 15 percent of teens aged 12 to 17 do report that they have received sexually explicit images on their cell phones from people they knew personally (Pew Internet and American Life Project, 2009).
-
Expanding the Concept of Literacy. Make no mistake about it: digital and media literacy does not replace or supplant print literacy. At a time when the word “text” now means any form of symbolic expression in any format that conveys meaning, the concept of literacy is simply expanding. Literacy is beginning to be understood as the ability to share meaning through symbol systems in order to fully participate in society. Print is now one of an interrelated set of symbol systems for sharing meaning. Because it takes years of practice to master print literacy, effective instruction in reading and writing is becoming more important than ever before. To read well, people need to acquire decoding and comprehension skills plus a base of knowledge from which they can interpret new ideas. To write, it is important to understand how words come together to form ideas, claims and arguments and how to design messages to accomplish the goals of informing, entertaining or persuading.
-
3More
12 Sites and web based tools that shined in 2012 - 0 views
9More
World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views
-
internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
-
all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
-
Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
- ...5 more annotations...
-
Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
-
The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
-
Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
-
Technology can provide solutions to many problems but its use can also vary from one culture to another.
6More
LexisNexis® Academic: Document - 0 views
-
-
1) Content and Credibility a. Is the article accurate & thorough i. Incredibly so. It not only had links to the web article but also links and information on the entire company. b. Does it answer your questions about the topic i. Not directly but through links to the company's press releases. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. The time stamp on the article is March 12, 2014. It doesn't appear to be revised after that date. b. Is there information that could be updated? i. Not really. This one is pretty good because it covers not only basic information about the company but also links to the content I was looking for directly. 3) Authority and Credibility a. Is the author identified? i. No but it does have the page it is from. b. Can we see their job title or description? i. Not for the person who wrote the article but the financial institution that it came from. c. Can you see where the article originates? i. Yes from Reuters Knowledge Direct. 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. This site is often updated. In this case mostly in a timely fashion. b. Can you rely on this source over time to provide up-to-date information? i. It still isn't real time but it is pretty close. This article was uploaded just a couple days ago. c. Does the internet site contain complete information as found in the comparable article? i. Yes. At least as it relates to the discussion of gay rights. This article has more information on the whole company. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. This article is factual instead of guiding towards a particular view. Because it focuses on the company as a whole and not the current debate it maintains its neutrality. b. Is there information included or not included that is found in the comparable article? i. Not within the scope of this article. Because this article just dic
-
-
var myVar; function googleTranslateElementInit() { new google.translate.TranslateElement({ pageLanguage: 'auto' }, 'google_translate_element'); myVar=setInterval(function(){chkGoogle()},1000); } //Start: 4734642: SEC content seach causes screen to freeze: Nikhil function chkGoogle(){ var obj = $('.goog-te-combo')[0].value; if(obj!=null && obj!=""){ clearInterval(myVar); showHideOriginal(); obj.onchange = function(){showHideOriginal();} } } function showHideOriginal(){ var googleTranslateLang = $('.goog-te-combo')[0].value; if(googleTranslateLang!=null && googleTranslateLang!=""){ document.getElementById("showOrigBut").style.display = 'block'; } else{ document.getElementById("showOrigBut").style.display = 'none'; } } //End: 4734642: SEC content seach causes screen to freeze: Nikhil Copyright 2014 Thomson Financial, All Rights Reserved Reuters Knowledge Direct
- ...3 more annotations...
-
TELEPHONE: Main Phone: 31-20-5239239, Contact Phone: 31-312-5239590 FAX: 31-20-6622640 URL: Home Page: http://www.theheinekencompany.com E-MAIL: investors@heineken.com OTHER URL:News Releases: http://www.theheinekencompany.com/media/media-releasesInvestor Relations: http://www.theheinekencompany.com/investorsFinancial Information: http://www.theheinekencompany.com/investors/reports-and-presentations?tab=financialsCorporate History/Profile: http://www.theheinekencompany.com/about-us/company-strategyExecutives: http://www.theheinekencompany.com/investors/governance/executive-boardProducts/Services: http://www.theheinekencompany.com/brandsEmployment Opportunities: http://www.theheinekencompany.com/careers
2More
shared by Lucas Pergler on 16 Aug 13
- No Cached
File Sizes for Kindle Books-The Text, the Images, and the Cover Image - 0 views
webdesign.about.com/...kindle-file-sizes.htm
Internet ebscohost Internet Collaboration Online Collaboration file sizes text
![](/images/link.gif)
-
-
1,2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for getting answers from professionals in the appropriate field. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed under the title for copyright. 5)No citation is given aside from general name for source of information. 6,7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
-
7More
What can you do with digital security | CompuClever - 0 views
-
Despite a time of global recession, the “Digital Universe” expanded by 62% and by 2020 it will be 44 times as big. We will have amassed digital information that can be described in zettabytes – that is to say, one zettabyte being a million, million gigabytes. This would be the equivalent of a stack of DVD’s going halfway to Mars.
-
This includes: public transport tracking; workplace surveillance, examination of communications (collecting data on all phone calls, emails, chat room discussions and web-browsing habits); mobile phone tracking; vehicle tracking; DNA database sampling; overseas travel; collecting data on political and environmental protestors; and using unmanned aircraft systems (drones) for purposes of security.
- ...2 more annotations...
-
effective tools to analyze data, weed out the information that can be safely deleted, remove personal information that can cause us harm if it falls into the wrong hands (including hackers or unethical online businesses), and we need secure storage
2More
EBSCOhost: ETIQUETTE ONLINE: From NICE to NECESSARY. - 0 views
-
-
Different types of technology require difterent forms of etiquette [4]. Textmessaging via a mobile phone is difterent from instant messaging and worlds apart from the asynchronous experience of email. A short abrupt comment that is acceptable in instant messaging may not be in email where some people expect to be addressed by name. Emotional affordances, syntax, and semantics vary across technology, too. 1-urthermore, new technologies may challenge previously accepted norms. Who would have guessed that having a stranger edit one's fastidiously composed prose without first asking; permission would be acceptable?
-
-
-
Age differences in online behavior in nonacademic environments such as online shopping and purchasing (Sorce, Perotti & Widrick, 2005) or Web search (Grahame, Laberge, & Scialfa, 2004) have been often discussed in the literature, but only a small number of studies have been conducted to examine age differences in adult learners' online learning behavior in academic settings. Those studies revealed significant differences in online behavior due to age; however, it is difficult to conclude age-dependent online behavior based on the studies because of the contextual or missing definitions of "younger" and "older" used in the studies.
-
3More
digiteen - Digital Security and Safety - 0 views
-
Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
-
Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
-
one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
7More
shared by Jose Nieves on 25 Feb 13
- No Cached
How the Internet brought down a dictator - Technology on NBCNews.com - 0 views
www.nbcnews.com/...t-brought-down-dictator-125222
social networking 3.6 Egypt research mubarak revolution social
![](/images/link.gif)
-
The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
-
"The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
-
a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
- ...4 more annotations...
-
The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
-
As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
-
Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
18More
Comcast agrees to buy Time Warner Cable for $45 billion - Feb. 13, 2014 - 0 views
-
rification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
- ...9 more annotations...
-
Comcast said Thursday it had agreed to buy Time Warner Cable for $45 billion in a deal that would combine the two biggest cable companies in the United States.
-
© 2014 Cable News Network. A Time Warner Company. All Rights Reserved
-
elated: Weather Channel's cable fight is the tip of the iceberg
-
Related: Customers say deal is evil
-
-
Clarification: An earlier version of this story had a chart showing that DirecTV has 31 million subscribers. That is its global subscriber number. The company has 20.2 million subscribers in the U.S.
-
-
-
This isn't about TV anymore -- it's about controlling a fatter, more intelligent pipe for multiple services that emanate from it," including broadband Internet, phone and home security monitoring, said Tim Hanlon, the founder of the Vertere Group, an investment advisory firm that focuses on media and technology.
19More
Wireless electricity? It's here - CNN.com - 0 views
-
What's the trick?
-
Wireless homes Don't worry about getting zapped: Hall assures that the magnetic fields used to transfer energy are "perfectly safe" -- in fact, they are the same kind of fields used in Wi-Fi routers.
-
In the house of the future, wire-free energy transfer could be as easy as wireless internet. If all goes to WiTricity's plans, smartphones will charge in your pocket as you wander around, televisions will flicker with no wires attached, and electric cars will refuel while sitting on the driveway.
- ...11 more annotations...
-
WiTricity have already demonstrated their ability to power laptops, cell-phones, and TVs by attaching resonator coils to batteries -- and an electric car refueller is reportedly in the works.
-
World outside
-
When Hall first saw the wireless bulb, she immediately thought of medical technology -- seeing that devices transplanted beneath the skin could be charged non-intrusively.
-
WiTricity is now working with a medical company to recharge a left-ventricular assist device -- "a heart-pump essentially." The technology opens the door to any number of mobile electronic devices which have so far been held back by limited battery lives.
-
What's next? The challenge now is increasing the distance that power can be transferred efficiently. This distance -- Hall explains -- is linked to the size of the coil, and WiTricity wants to perfect the same long-distance transfers to today's small-scale devices. For this reason, the team have high hopes for their new creation: AA-sized wirelessly rechargeable batteries. For Hall, the applications are endless: "I always say kids will say: 'Why is it called wireless?'" "The kids that are growing up in a couple of years will never have to plug anything in again to charge it."
-
Dr Katie Hall is developing ways to transfer power without wires In the home of the future, wireless energy will be as common as Wi-Fi Internet, she believes The technology could lead to new and revolutionary medical devices
-
-
-
It's great to see so much discussion of this technology on social media and the comments thread. There seems to be a lot of interest in the contribution of Nikola Tesla's experiments to the development of this technology. Dr Hall discussed Tesla briefly in her interview with Nick Glass: Nick Glass: Given that Tesla and others realized all this over a Century ago, why's it taken so long? Dr Hall: I don't think they realized exactly what we've done. They were certainly dreaming of wireless power -- there's no question about that. In those days, it was a different problem, because they were really thinking about: how do they get the power from where it's generated to where it's used. And in that case they might have been thinking about Niagara Falls generating the power and getting it to New York City -- and that's a long distance. We're not proposing that the technology we have here at WiTricity would be used for that kind of application. When we came around, power's already being transferred by wires to homes and rooms and things of that nature, so we had a much different problem, which was really just this much shorter distance. As WiTricity have mentioned on their website the Highly Resonant Wireless Power Transfer technology they have developed is also distinct from Tesla's creations -- and, crucially, is efficient enough to be economically viable.
11More
shared by Steve Dolan on 05 Oct 13
- No Cached
Digital natives and digital immigrants - 0 views
www.nacada.ksu.edu/...es-and-digital-immigrants.aspx
digital immigrant digital native definition research vocabulary reference digital literacy
![](/images/link.gif)
DGL Diigo liked it
-
he Digital Immigrant is the latecomer in the technology revolution and as with any immigrant, there is a certain “accent” that is readily apparent to the native speakers.
- ...7 more annotations...
-
Immigrants grew up learning one topic at a time, everything in order, following a linear and logical progression, but Natives do not think that way.
-
Another major difference between Immigrants and Natives is a sense of identity (DigitalNative.org, 2007). To Digital Immigrants, cell phones, emails, and the Internet are just tools that can be used to reach someone or set up a “real” face-to-face meeting. Natives look at the same technologies and see an extension of who they are.
-
Digital communication is just as real to Natives as face-to-face meetings are to Immigrants.
-
Many Immigrants consider education as the process that forces as much information into students’ heads as possible so they can regurgitate a laundry list of facts at a moment’s notice. Natives donotconsider this an education.
-
Immigrants should be willing to teach Natives how to find important information and put less emphasis on forcing the students to learn exact information.
-
Prensky, Marc. (2007) To Educate, We Must Listen. Retrievedfrom http://www.marcprensky.com/writing/Prensky-To_Educate,We_Must_Listen.pdf
14More
Should Reddit Be Blamed for the Spreading of a Smear? - NYTimes.com - 1 views
-
By 8 p.m., three hours after the F.B.I. released the suspects’ photos, angry messages began to appear on the Tripathi’s Facebook page, and at 8:15 Ravi received a phone call from a reporter at ABC News in New York, who asked if Sunil had been spotted in Boston and if Ravi had seen the F.B.I. photos of Suspect No. 2. Ravi, unclear at what she was getting at, told her there had been no word from Sunil.
-
The Facebook page was created with the hope that if Sunil searched for himself, he would find loving messages from his family and friends.
-
At 10:56 p.m., Stone tweeted: “I’m sure by now the @fbipressoffice is looking into this dude” and included a link to the Facebook page. Seven minutes later, she tweeted: “Seconds after I sent that tweet the page is gone off of Facebook. If you can cache it . . .” Several journalists began tweeting out guarded thoughts about Sunil’s involvement.
- ...7 more annotations...
-
At 2:43 a.m., a Twitter user named Greg Hughes (@ghughesca), who was previously tweeting things like, “In 2013, all you need [is] a connection to the Boston police scanner and a Twitter feed to know what’s up. We don’t even need TV anymore,”
-
Seven minutes later, Kevin Galliford, a journalist for a TV station in Hartford, relayed the same information to his own followers; Galliford’s tweet was retweeted more than 1,000 times in a matter of minutes.
-
Andrew Kaczynski, a journalist at BuzzFeed, who sent out the police-scanner misinformation to his 81,000 followers
-
@YourAnonNews, a Twitter news feed connected to the hacker collective Anonymous, tweeted out Tripathi’s name to the hundreds of thousands of people
-
Roughly 300 Twitter users retweeted Malinowski’s second post on the subject, including the pop-culture blogger Perez Hilton, who sent Sunil Tripathi’s name out to more than six million followers.
-
Reddit enjoyed record-breaking traffic numbers during the Boston coverage, and the company has always considered itself “content agnostic,” meaning that as long as what’s being posted is legal, Reddit will not intervene and take it down.
-
@YourAnonNews is very likely to surpass the Twitter following of most major American newspapers. The account is followed by hundreds of journalists, myself included. For those who dream of a post-Snowden utopia where no government and corporate secrets are protected, @YourAnonNews is one of the only trustworthy news sources out there.