Skip to main content

Home/ Digiteen/ Group items tagged customization

Rss Feed Group items tagged

Molly S

The World Clock - Time Zones - 0 views

  • The World Clock – Time Zones Africa | North America | South America | Asia | Australia/Pacific | Europe | Capitals | Custom ClockSort by: CityCountryTimeCity Search: SettingsAccraMon 1:38 PMCasablancaMon 1:38 PMKiritimatiTue 3:38 AMPragueMon 2:38 PMAddis AbabaMon 4:38 PMChicago *Mon 8:38 AMKolkataMon 7:08 PMReykjavikMon 1:38 PMAdelaide *Tue 12:08 AMColumbus *Mon 9:38 AMKuala LumpurMon 9:38 PMRio de Janeiro *Mon 11:38 AMAlgiersMon 2:38 PMCopenhagenMon 2:38 PMKuwait CityMon 4:38 PMRiyadhMon 4:38 PMAlmatyMon 7:38 PMDallas *Mon 8:38 AMKyivMon 3:38 PMRomeMon 2:38 PMAmman *Mon 4:38 PMDar es SalaamMon 4:38 PMLa PazMon 9:38 AMSalt Lake City *Mon 7:38 AMAmsterdamMon 2:38 PMDarwinMon 11:08 PMLagosMon 2:38 PMSan Francisco *Mon 6:38 AMAnadyrTue 1:38 AMDenver *Mon 7:38 AMLahoreMon 6:38 PMSan JuanMon 9:38 AMAnchorage *Mon 5:38 AMDetroit *Mon 9:38 AMLas Vegas *Mon 6:38 AMSan SalvadorMon 7:38 AMAnkaraMon 3:38 PMDhakaMon 7:38 PMLimaMon 8:38 AMSantiago *Mon 10:38 AMAntananarivoMon 4:38 PMDohaMon 4:38 PMLisbonMon 1:38 PMSanto DomingoMon 9:38 AMAsuncion *Mon 10:38 AMDubaiMon 5:38 PMLondonMon 1:38 PMSao Paulo *Mon 11:38 AMAthensMon 3:38 PMDublinMon 1:38 PMLos Angeles *Mon 6:38 AMSeattle *Mon 6:38 AMAtlanta *Mon 9:38 AMEdmonton *Mon 7:38 AMMadridMon 2:38 PMSeoulMon 10:38 PMAuckland *Tue 2:38 AMFrankfurtMon 2:38 PMManaguaMon 7:38 AMShan
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Micah K

How to Respect Cultural Differences | eHow.com - 0 views

  •  
    This article discusses how to respect others who have cultural differences. "Respecting the cultural differences of other people consists of more than just refraining from making ignorant comments or avoiding offense. It also consists of including them in events that have to do with your culture and participating in customs and traditions surrounding theirs."
Vicki Davis

Pageflakes - Sandy's Literacy Blogs - 1 views

  •  
    40 literacy blogs aggregated on one pageflake. This is a great example of the building of customized PLN's to help others understand the purpose of a PLN. If you're a librarian or working with literacy -- why not set this to be your start page - even for just a few days to see what happens. Or, even better - use your favorite rss reader and construct your own Personal learning network using many of these blogs.
Becca B

Top 10 Internet Etiquette Rules to Survive Online | Webupon - 0 views

  • Make use of emoticons like and which help you to get your message across. At certain times, what you write in emails or messages may be misunderstood (omg i have too much experience in this matter lol) and using emoticons will help the understanding of your message. They also add a bit of color and interest to the message.
  • Get to the point! Do your best to keep your messages brief and to the point. This way, the receiver will get a clear understanding of what you mean to say.
  • Do not forward or create spam or chain letters. People would hate you to the max if you did this. It wastes time and has no point. Chain letters are just sometimes random and no one really gives anyway…
  • ...1 more annotation...
  • Never forget to greet people politely in every message you send. It really makes you seem like a friendly person.
  •  
    "# Never type a group of words or a phrase in upper case. IT MAKES IT LOOK AS THOUGH YOU ARE SHOUTING, doesn't it? Other people will get the feeling that you are being a bit rude. The best idea is to stick to regular sentence case when blogging, emailing, commenting, messaging, etc… # Always speak to others the way you would expect yourself to be spoken to in the physical world. Do not curse, swear, or insult others- just imagine what you'd feel like if you were spoken to like that! # Make use of emoticons like :) and :( which help you to get your message across. At certain times, what you write in emails or messages may be misunderstood (omg i have too much experience in this matter lol) and using emoticons will help the understanding of your message. They also add a bit of color and interest to the message. # Patience is the key on the web these days. If you are upset or angry about something, try and wait a while before writing another message. This way, you can calm down and think carefully about your wording in terms of politeness. Remember, once you hit 'send', your message has gone into cyberspace forever! # Get to the point! Do your best to keep your messages brief and to the point. This way, the receiver will get a clear understanding of what you mean to say. # Be careful with using the "Reply All" option whilst in contact online. Do you really want everyone to get this message or only the person who sent it to you? # If someone bullies you or writes something bad to you, don't insult them back. Why? Cause it just doesn't work! Simply ignoring them or blocking their messages does the trick. If your using a messaging service like AOL, Yahoo, or Gmail (As well as thousands of others) then here's a little way of permanently annoying them. Save a copy of every email that was sent to you which you considered offensive and send directly to the administrators or customer service. This will most likely ban the perpetrator from ever using the ser
Steve Madsen

Optus says 'yes' to internet filter plan - BizTech - smh.com.au - 0 views

  •  
    Article related to Australia.
  •  
    OPTUS customers in Sydney and Newcastle will be asked to take part in the Federal Government's controversial test of internet filters.
Steve Madsen

iLike Launches Custom iPhone Apps, Syndication Platform To Help Artists Connect With Fans - 0 views

  •  
    iLike is also rolling out a platform that will allow artists to create their own iPhone applications, which can include dynamically updated photos, music, blog posts, and other content (
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Erin B

digiteen2008 - Digital Commerce - 0 views

  •  
    This is last year's project page. We might be able to get some ideas from this for our project this year if you are in Group 9A. It has a couple of videos and other information that might be useful.
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Julie Lindsay

The Tell-All Generation Learns When Not To, at Least Online - NYTimes.com - 0 views

  •  
    "The conventional wisdom suggests that everyone under 30 is comfortable revealing every facet of their lives online, from their favorite pizza to most frequent sexual partners. But many members of the tell-all generation are rethinking what it means to live out loud. "
Ahmed Kiyoshi El Maghraby

credit cards cloned - 0 views

  • Using tiny technology disguised as part of the machine, the thieves then press new cards with customers' numbers and run amok
Ahmed Kiyoshi El Maghraby

eWay security - 1 views

  • With business suddenly booming, the company tapped the services of Macquarie Hosting to ensure customer data was encrypted and firewalls were secure.
  • Compliance with the data security standard has opened the door to billions of dollars worth of business, according to Macquarie Telecom hosting managing director Aidan Tudehope.
radhika chatterjee

Media group to create new digital video ecosystem | Technology | Reuters - 0 views

  • A group of media industry companies said it is planning to build a digital world where video devices and content websites play together in perfect harmony, and consumers can safely store their digital content and access it anywhere in the world.
  • The consortium of Hollywood studios, retailers, service providers, and consumer electronics and information technology companies, called the Digital Entertainment Content Ecosystem, or DECE, is working on a "uniform digital media experience"
  • customers a "rights locker" or virtual library where consumers' digital video purchases would be stored for retrieval in a manner similar to accessing an email account, Singer said.
  • ...3 more annotations...
  • for interoperability of devices and websites
  • "We will be developing a ... specification that services and device makers can license. They can use the logo to associate their device, knowing that when the consumer goes to buy the content, they know it will play," Singer said.
  • "They knew that when they brought (a DVD) home, they could play it on the device of their choice," Coblitz said. "We see this vision of 'buy once, play anywhere.'"
anonymous

AMAX Information Technologies | NVIDIA® Tesla™ High Performance Computing (HP... - 0 views

  • Ideal for life sciences, geosciences, engineering & sciences, molecular biology, medical diagnostics, electronic design automation (EDA), government and defense, visualization, financial modeling, and oil & gas applications.
    • anonymous
       
      How speed changed the way we interpert data, and work with different ideas.
Steve Madsen

When to start teaching self branding « The Thinking Stick - 0 views

  •  
    When do we start teaching students about self branding?
James D

Stand Up For Your Digital Rights - Do You Have the Right to Be Informed if a Company Le... - 0 views

  • California is the only state where businesses are required to notify customers if the privacy of their personal or financial information is compromised. There is, however, a similar measure being discussed for New York State, and federal laws like California's may follow.
  • And one last thing to remember about your identity online is that posing as another person can get you in hot water.
Erin B

E-Commerce News: E-Commerce - 0 views

  •  
    This seems like a new way advertisers may be using ecommerce to their advantage. "Smartphones Get More AdSense October 05, 2009 Google has developed a new JavaScript snippet for AdSense aimed at high-end mobile phones, giving advertisers yet another option for using its mobile platform. The new feature allows publishers to run larger-scale text and image ads on smartphones. As more people use these devices, more advertisers want to be able to target them, noted a Google engineer in a blog post on the rollout."
1 - 20 of 27 Next ›
Showing 20 items per page