Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "that" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

EBSCOhost: Critical Appraisal of Information on the Web in Practice: Undergraduate Stu... - 0 views

  • Results indicated that students failed to use critical appraisal criteria, and that while knowledge of and self-reported use of these criteria were related to each other, they were not related to behaviour. This research demonstrates the need for alternative strategies for critical appraisal instruction and assessment. (Contains 3 figures.)
    • Lisa Lowder
       
      This article is credible. It is a research paper measuring how students actually use their information literacy skills. It contains many scholarly references and conclusions seem to be well supported. The authors are identified and the article is from a professional journal.
  •  
    This article describes a practical analysis of how students actually use information literacy. It argues that students may know what they are supposed to do to evaluate information but they do not often do it. An argument is made that students can be taught information literacy in universities.
7More

How the Internet brought down a dictator - Technology on NBCNews.com - 0 views

  • The wildfire flame of social networking burned quickly. In just a few weeks, Ghonim's page — We are all Khaled Said — had accumulated 130,000 fans, according to the New York Times. Ghonim this week said that the page has 375,000 followers. (The English-language site visible to U.S. Facebookers has just over 71,000 followers.) In a country with around 5 million Facebook users, that is a large percentile, and doesn't count Facebook users who may visit the page without "liking" it.
  • "The real threat to the regime is people will take pictures of the police beating their brothers and sisters, and the regime can't respond well to Facebook images of the police shooting rubber bullets into a crowd," Howard told msnbc.com on Jan. 28. "There is no regime response for those images that go out over trusted networks."
  • a service called SpeakToTweet, launched by Google and Twitter, brought voices of Net-deprived Egyptians to the global forum of Twitter by way of a phone number. Just like regular voicemail, people could call and leave a message.
  • ...4 more annotations...
  • The system was heralded as a wondrous workaround, and a symbol of Internet ingenuity triumphing over real world adversity
  • Alive In Egypt that posted the translations of the tweets, along with the original audio.
  • As many as 3,000 messages were logged by Twitter, effectively providing yet another stream of Internet news from inside Egypt
  • Taking away the Internet brings attention to people's protests in a way that the protests by themselves can't muster," Cowie said.
2More

Obama to propose key changes in data collection program - NBC Politics - 0 views

    • Reshunda Pickens
       
      The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. No  The information on the topic is thorough. No  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 10.7  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. No  There is a way to contact the author (s) via e-mail or traditional mail. No  You can easily tell from the domain name where the page originates. Yes  Total: 5  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10 
  •  
    The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 10.7 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. No There is a way to contact the author (s) via e-mail or traditional mail. No You can easily tell from the domain name where the page originates. Yes Total: 5 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Multimedia (0 to 10 P
1More

Heineken Beer Makers Join Sam Adams In Dropping Out Of St. Patrick's Day Parade Over Ga... - 0 views

    • chris mackie
       
      1) Content - The content on this page is good. It can be easily read and understood. The layout allows it to be read while still adding adds for other related articles. It was uploaded 3/15 and updated later the same day. 2) Credibility - The Author itself I'm not familiar with, but it also appears to be an article by Reuters. Reuters is an organization that a lot of news agencies use and are widely trusted. 3) Critical Thinking - Because of their references and ties to Reuters you can with most certainly use critical thinking to assume this page is legitimate. 4) Copyright - The website it's self only says 2014 for the copyright. But this article itself was uploaded 3/15/14. Because of their copyright it can be assumed that this article is covered by it. 5) Citation - They do use some outside images and the text itself is from Reuters. But they credit them on the page so there is no infringement. 6) Continuity - This page can only be physically edited by the Huffington Post staff. So the continuity is withheld without errors. 7) Censorship - Because this page is moderated by Huffington post themselves there is a chance that it is edited. Also the comments system seem to be moderated in the regard that you can post what you want but if you offend someone the site admin can take it down. 8) Connectivity - The connectivity to the page is good. Many users can access it at the same time and it can be used as a jumping off point to either paid supported products or additional articles written by Huffington Post. 9) Comparability - You could take the information on this page and check it against numerous sources. I checked Google and came up with many results that either cite the beginning article or copy this article directly. 10) - Context - The context of this page is really good. They maintain the stance that Heineken and Sam Adams are taking without passing judgment, in support or not, for either the companies or the parade organize
2More

Blogging - 0 views

  • The term blogging is used as a verb to refer to the action that is performed by a person when they make a post to a web log or a blog. A blog is a journal, diary or a personal website that is kept on the internet and updated frequently by a person.
  •  
    The term blogging is used as a verb to refer to the action that is performed by a person when they make a post to a web log or a blog. A blog is a journal, diary or a personal website that is kept on the internet and updated frequently by a person.
5More

Disinformation - 0 views

  • alse information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media.
    • Joey Martinez
       
      Misleading information.
    • Joey Martinez
       
      false information that is intended to mislead.[8 minutes ago] false information that is intended to mislead.[8 minutes ago]
  •  
    Disinformation:  False information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media. http://www.google.com/webhp?nord=1#nord=1&q=what+does+disinformation+mean Disinformation:  Deliberately misleading information announced publicly or leaked by a government or especially by an intelligence agency in order to influence public opinion or the government in another nation: http://www.thefreedictionary.com/disinformation  
  •  
    Disinformation:  False information that is intended to mislead, esp. propaganda issued by a government organization to a rival power or the media. http://www.google.com/webhp?nord=1#nord=1&q=what+does+disinformation+mean
7More

What Is Digital Identity? - 1 views

  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. that is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
    • hunta3454
       
      The knowledge of wha your digital identity actually is.
    • Joey Martinez
       
      I think our digital identity represents how we behave, intercact, and portray ourselves in the digital world.
  • the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships.
  • ...1 more annotation...
  • Digital identity refers to the ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. that is, it defines a thing both in and of itself and in relationship to other things. Both a person and a company can have a digital identity and while a person always has a concrete identity in the world, businesses may have a storefront identity and establish a digital presence as they establish an online presence in order to do business online. Alternatively, the digital identity may be the one and only identity. Barnes & Noble® is an example of the first type of business; Amazon® is an example of the second.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity
17More

New Media Literacy In Education: Learning Media Use While Developing Critical Thinking ... - 1 views

    • ino moreno
       
      very good search criteria here. explains how to narrow your search and validify information
  • What sources does the author cite, and what do others say about those sources?
  • Education, media-literacy-wise, is happening now after school and on weekends and when the teacher isn't looking, in the SMS messages, MySpace pages, blog posts, podcasts, videoblogs that technology-equipped digital natives exchange among themselves.
  • ...13 more annotations...
  • At that point, I saw education – the means by which young people learn the skills necessary to succeed in their place and time – as diverging from schooling.
  • chools will remain places for parents to put their kids while they go to work, and for society to train a fresh supply of citizen-worker-consumers to be employed by the industries of their time.
  • But the kind of questioning, collaborative, active, lateral rather than hierarchical pedagogy that participatory media both forces and enables is not the kind of change that takes place quickly or at all in public schools.
  • someone needs to educate children about the necessity for critical thinking and encourage them to exercise their own knowledge of how to make moral choices.
  • the basic moral values – is supposed to be what their parents and their religions are responsible for.
  • But the teachable skill of knowing how to make decisions based on those values has become particularly important now that a new medium suddenly connects young people to each other and to the world's knowledge in ways no previous generation experienced.
    • ino moreno
       
      anything can be learned by researching on the internet and proper wordings. as long as you know whats going to give you the truest results.
    • ino moreno
       
      the ability to differentiate between right and wrong is a huge deal when researching and trying to find good knowledge.. for example if you where to type "blow up" in google you would get all kinds of "JuNK" if you were to specify a noun in the search you could exponentially narrow your "junk" results. "Right vs. Wrong" isnt always pertaining to internet pornography. as said in this article. the principles behind it are what matters as well as your ability to use them.
  • e teach our kids how to cross the street and what to be careful about in the physical world. And now parents need to teach their kids how to exercise good sense online. It's really no more technical than reminding your children not to give out their personal information to strangers on the telephone or the street. When it comes to helping them learn how to be citizens in a democracy, media literacy education is central to 21st century civic education.
  • At the same time that emerging media challenge the ability of old institutions to change, I think we have an opportunity today to make use of the natural enthusiasm of today's young digital natives for cultural production as well as consumption, to help them learn to use the media production and distribution technologies now available to them to develop a public voice about issues they care about.
  • The media available to adolescents today, from videocameraphones to their own websites, to laptop computers, to participatory media communities like MySpace and Youtube, are orders of magnitude more powerful than those available in the age of the deskbound, text-only Internet and dial-up speeds.
  • Those young people who can afford an Internet-connected phone or laptop are taking to the multimedia web on their own accord by the millions– MySpace gets Google-scale traffic and Youtube serves one hundred million videos a day.
  • Although the price of entry is dropping, there is still an economic divide; nevertheless, the online population under the age of 20 is significant enough for Rupert Murdoch to spend a quarter billion dollars to buy MySpace.
  •  
    permalink. Media literacy in education and the importance of.
2More

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
3More

Kids become literate faster with multimedia technology | abc7news.com - 0 views

    • preston williams
       
      using technology in school is helping the growth of children and developing a stronger learning process and technique. Utilizing these applications helps to keep the children more interested in their school work and the tend not to lose focus
  • The study concluded that children, especially in low income groups, learned an average of 7.5 more letters than children who didn't use the system during the same time period.
  • A new study indicates that preschoolers become literate faster in a curriculum that uses video and online technology. Menlo Park's SRI International conducted the research at a school in East Palo Alto. Do literacy skills increase when preschool classrooms incorporate video and games? To answer that question, the Corporation for Public Broadcasting commissioned Education Development Corporation and SRI International. They studied 80 classrooms from New York to Ravenswood Child Development Center in East Palo Alto, where Tanya Senegal teaches 4-year-olds. "They're great," she says. "As you can see, they're eager, they love the sound, they love the music. And I like the fact that they can get up and be engaged with the video. They don't have to just sit."
12More

Disinformation - Wikipedia, the free encyclopedia - 0 views

    • ino moreno
       
      Interesting!
  • Another technique of concealing facts, or censorship, is also used if the group can affect such control. When channels of information cannot be completely closed, they can be rendered useless by filling them with disinformation, effectively lowering their signal-to-noise ratio and discrediting the opposition by association with many easily disproved false claims.
    • ino moreno
       
      Good examples!
  • ...6 more annotations...
  • Examples of disinformation
  • Disinformation may include distribution of forged documents, manuscripts, and photographs, or spreading malicious rumors and fabricated intelligence. Its techniques may also be found in commerce and government, used to try to undermine the position of a competitor.
  • A classic example of disinformation occurred during World War II, preceding the Normandy landings, in what would be known as Operation Fortitude. British intelligence convinced the German Armed Forces that a much larger invasion force was about to cross the English Channel from Kent, England.
  • The Cold War made disinformation a recognized military and political tactic. Military disinformation techniques were described by Vladimir Volkoff.
  • Conspiracy theorists often accuse governments of spreading disinformation in a "war for your mind", but also sometimes accuse each other of being "disinformation agents".
  • Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth.
    • Ryan ORourke
       
      Good info
  •  
    "Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth."
  •  
    "Disinformation is intentionally false or inaccurate information that is spread deliberately. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth."
5More

Digital identity - Wikipedia, the free encyclopedia - 0 views

  • evails in the domains of cyberspace, and is defined as a set of data that uniquely describes a person or a thing (sometimes referred to as subject or entity) and contains information about the subject's relationships to other entities
  • is a psychological identity that pr
    • gb malone
       
      digital identity; is online identity describes a person or a thing and contains information
  • ...2 more annotations...
  • Digital identity fundamentally requires digital identifiers—strings or tokens that are unique within a given scope (globally or locally within a specific domain, community, directory, application, etc.). Identifiers are the key used by the parties to an identification relationship to agree on the entity being represented. Identifiers may be classified as omnidirectional and unidirectiona
  • Despite the fact that there are many authentication systems and digital identifiers that try to address these problems, there is still a need for a unified and verified identification system.
2More

EBSCOhost: Social Media Etiquette: How to behave and stay safe online. - 0 views

    • Jose Nieves
       
      basically states that if kids were given more guidance they would have a better grasp of proper etiquette. 
  •  
    explains that things that you post can have serious consequences.
6More

LexisNexis® Academic: Document - 0 views

    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Incredibly so. It not only had links to the web article but also links and information on the entire company. b. Does it answer your questions about the topic i. Not directly but through links to the company's press releases. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. The time stamp on the article is March 12, 2014. It doesn't appear to be revised after that date. b. Is there information that could be updated? i. Not really. This one is pretty good because it covers not only basic information about the company but also links to the content I was looking for directly. 3) Authority and Credibility a. Is the author identified? i. No but it does have the page it is from. b. Can we see their job title or description? i. Not for the person who wrote the article but the financial institution that it came from. c. Can you see where the article originates? i. Yes from Reuters Knowledge Direct. 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. This site is often updated. In this case mostly in a timely fashion. b. Can you rely on this source over time to provide up-to-date information? i. It still isn't real time but it is pretty close. This article was uploaded just a couple days ago. c. Does the internet site contain complete information as found in the comparable article? i. Yes. At least as it relates to the discussion of gay rights. This article has more information on the whole company. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. This article is factual instead of guiding towards a particular view. Because it focuses on the company as a whole and not the current debate it maintains its neutrality. b. Is there information included or not included that is found in the comparable article? i. Not within the scope of this article. Because this article just dic
  • March 12, 2014Heineken N.V. (ADR)Tweede Weteringplantsoen 21 AMSTERDAM 1017 ZD Netherlands
  • var myVar; function googleTranslateElementInit() { new google.translate.TranslateElement({ pageLanguage: 'auto' }, 'google_translate_element'); myVar=setInterval(function(){chkGoogle()},1000); } //Start: 4734642: SEC content seach causes screen to freeze: Nikhil function chkGoogle(){ var obj = $('.goog-te-combo')[0].value; if(obj!=null && obj!=""){ clearInterval(myVar); showHideOriginal(); obj.onchange = function(){showHideOriginal();} } } function showHideOriginal(){ var googleTranslateLang = $('.goog-te-combo')[0].value; if(googleTranslateLang!=null && googleTranslateLang!=""){ document.getElementById("showOrigBut").style.display = 'block'; } else{ document.getElementById("showOrigBut").style.display = 'none'; } } //End: 4734642: SEC content seach causes screen to freeze: Nikhil Copyright 2014 Thomson Financial, All Rights Reserved Reuters Knowledge Direct
  • ...3 more annotations...
  • TELEPHONE: Main Phone: 31-20-5239239, Contact Phone: 31-312-5239590 FAX: 31-20-6622640 URL: Home Page: http://www.theheinekencompany.com E-MAIL: investors@heineken.com OTHER URL:News Releases: http://www.theheinekencompany.com/media/media-releasesInvestor Relations: http://www.theheinekencompany.com/investorsFinancial Information: http://www.theheinekencompany.com/investors/reports-and-presentations?tab=financialsCorporate History/Profile: http://www.theheinekencompany.com/about-us/company-strategyExecutives: http://www.theheinekencompany.com/investors/governance/executive-boardProducts/Services: http://www.theheinekencompany.com/brandsEmployment Opportunities: http://www.theheinekencompany.com/careers
  • LOAD-DATE: March 12, 2014
  • Source [Reuters Knowledge Direct]
2More

Massive Open Online Course (MOOC) - 0 views

  • Definition - What does Massive Open Online Course (MOOC) mean? A massive open online course (MOOC) is an online course that has open access and interactive participation by means of the Web
  •  
    A massive open online course (MOOC) is an online course that has open access and interactive participation by means of the Web. MOOCs provide participants with course materials that are normally used in a conventional education setting - such as examples, lectures, videos, study materials and problem sets.
1More

Does the adoption of plagiarism-detection software in higher education redu...: EBSCOhost - 0 views

    • Joseph Rhodes II
       
      Note 1: Widespread access to the Internet and other electronic media has served as something of a double-edged sword with respect to plagiarism; the Web allows students to plagiarism with cut-and-paste ease, but also allows academics to more easily identify the source of the plagiarized material when plagiarism is suspected(Lyon, Barrett, and Malcolm 2006). Note 2: The Internet allow suspicious student writing to be more quickly compared to other sources using a standard internet search engine, leaving the detection of suspicious writing as the principle challenge. Note 3:  given that some systems now permit students to upload their own writing to check for plagiarism in advance of submitting assignments, rates of unintentional plagiarism may drop, making the remaining intentional plagiarism easier to detect. Note 4: Others argue that the adoption of a plagiarism-detection system will not only aid faculty in detecting plagiarism, but will serve as a deterrent to plagiarism in the first place. Note 5: For example, Kraemer (2008) has argued that students who are made aware that plagiarism-detection technologies are in use should, at a minimum, avoid intentionally copying from other sources because of the near certainty that they will be caught. Further, for those students who may unintentionally plagiarize out of ignorance about the rule of citation, the use of plagiarism-detection software may motivate them to better inform themselves about citations and to double-check their own papers for unintentional plagiarism.
2More

Getting Started with Firefox extension - Diigo help - 0 views

  •  Feature Highlight: Highlights Diigo saves the day with "highlights". Highlights let you select the important snippets on a page and store them in your library with the page's bookmark. Let's try it. Just open a page, maybe one of your old-school bookmarks or one of your new cat bookmarks, and find the information on that page you actually care about. Select that important text. Got it? Okay, now put your hemet on, 'cause this might blow your mind! Click the highlight icon on the Diigo toolbar. It's the one with the "T" on a page with a yellow highlighter. You will notice that the selected text gets a yellow background. This means that the text has been saved in your library, and as long as you have the Diigo add-on the text will be highlighted on the page! How's that for easy?   Now you've highlighted the text. It will appear in your library within the bookmark for the page it is on. Go to your library and you can see how it works. If you're not sure how to get to your library, just click the second icon on the toolbar (Diigo icon to the left of the search bar) and then select "My Library »".
  • Sticky Notes on the Web What? I can put a sticky note on a web page? How? Oh, that's right! Diigo. Just right-click anywhere on the page and choose to "add a floating sticky note". Type up your note and choose "Post", then move the note anywhere on the page. You have to type a note first, before you move it where you want, otherwise there's nothing to move!
3More

Digital Immigrants - Prensky - 0 views

    • Laura Lewis
       
      This entire article defines Digital Natives and Digital Immigrants.
    • caprisunshine
       
      This article defines Digital Immigrants & Digital Natives.
  •  
    Digital Immigrant instructors, who speak an outdated  language (that of the pre-digital age), are struggling to teach a population that speaks an entirely new language.
6More

Frankenstorm Sandy Will Bring Flooding, Storm Surges to the East Coast | TIME.com - 0 views

  • will almost certainly be the largest storm to ever hit the East Coast, with a reach that extends some 450 miles beyond its core
  • “We’re looking at impact of greater than 50 to 60 million people,” said Louis Uccellini, head of environmental prediction for the National Oceanic and Atmospheric Administration (NOAA). A drone strike couldn’t be better targeted to cause maximum damage than this storm
  • NOAA put the storm surge threat from Sandy at 5.7 on that 6 point scale—greater than any hurricane observed between 1969 and 2005, including Category 5 storms like Katrina and Andrew. NOAA’s National Hurricane Center says that “life-threatening storm surge flooding” is expected along the mid-Atlantic coast.
  • ...2 more annotations...
  • amplified by the fact that Sandy will be hitting during high tide
  • The sheer oddness of Sandy’s arrival begs the obvious question: Is climate change involved here?
  •  
    This article by Bryan Walsh was published before Hurricane Sandy made landfall. It looks at the scientific data from NOAA's Hurricane Research Centre. As Time is a publication read by a large number of people, as opposed to NOAA, this media outlet provided the general population with detailed storm information and why the storm should be taken seriously.
10More

How companies used social media during Hurricane Sandy | World news | guardian.co.uk - 0 views

    • Rivkah WC
       
      Con Edison-largest investment owned energy company
  • the company had only set up in June gained an extra 16,000 followers over the storm.
  • "The most important thing we gained from all of this is people notice someone is paying attention",
  • ...7 more annotations...
  • Con Edison, MTA and JetBlue gathered to discuss their interactions with people through the storm and how that had changed their practices after Sandy moved on.
  • Aaron Donovan, media liaison at the MTA, said the agency had focussed on Twitter, Flickr and YouTube in its Sandy response, but noted that "Twitter had the broadest pick up in a very immediate way
  • He said MTA employees were encouraged to take photos and video while they were out inspecting lines or surveying damage
  • The photos that we send out in real time are the photos that get the largest pick up.
  • "First to communicate changes to service then throughout the storm itself," he said, but later to let people know what they are doing to update service
  • We have incoming tweets asking us questions all the time. We do not have the resources to respond to each and every questions all the time," he said. Instead, "the incoming feed is almost as important as the outgoing feed"
    • Malcolm Jackson
       
      People uses social media to wheather the storm of Hurricane Sandy.
‹ Previous 21 - 40 of 261 Next › Last »
Showing 20 items per page