Skip to main content

Home/ Digiteen/ Group items tagged effect

Rss Feed Group items tagged

radhika chatterjee

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
    • anonymous
       
      Impact > government
mitch g

Top 7 Ways to Communicate Effectively - 0 views

  • Have self-worth
  • Get interested in other people
  • Open up a person’s heart
  • ...5 more annotations...
  • Listen at least two times more than you talk
  • Diversify yourself
  • Understand that your worth never changes Follow along…In my hand I am holding a check for a million dollars. I crumble it up. It’s still worth a million dollars. I step on it, it’s still worth a million dollars, I start rubbing it on the floor with my shoe, and it’s till worth a million dollars. You are worth a lot more than a million dollars. In fact, your worth is immeasurable. Therefore, there is no such thing as ‘rejection’ as you’re always worth the same no matter what. Nobody can reject you because nobody can change your worth. Moreover, don’t be afraid of something (rejection) that doesn’t exist. Take risks, ask for what you want, and eventually you will get what you want.
  • Understand that your worth never change
  • Follow the step-ladder to success
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
Margaret O.

If We Can Change The Way We Communicate, We Can Change The Way We Educate | Fox News - 0 views

  • Many American classrooms are almost indistinguishable from those that students' grandparents attended.  Twenty-something students still sit in desks facing the front of the classroom, with textbooks, listening to a generalist teacher.
  • A new perspective is needed.  Americans need to consider the fundamental question:  How can we most effectively teach kids the skills they need? 
  • Traditional schools may be best for some students, while others will thrive in moire high-tech learning centers. 
  • ...3 more annotations...
  • Parents can augment or even replace their children's traditional school experience with programs from companies like K-12.  This service allows parents to enroll children in virtual schools or purchase specific curriculum.  Traditional materials—worksheets, books, and other physical materials—are combined with online resources, including multimedia presentations. 
  • If We Can Change the Way We Communicate, We Can Change the Way We Educate
  • Steve Jobs' passing last week encouraged Americans to consider how technology has transformed our lives.  Fueled by the creative genius of men like Jobs, new technology has emerged allowing us to better keep in touch with friends and family, access entertainment and information, and perform work from home or wherever we happen to be at that moment.  While we've successfully integrated technology into our workplaces and personal lives, we've been comparatively slow to apply technology's power to other areas of life, like education.  That needs to change.
  •  
    This changes parents' perspectives about letting their child use technology.
  •  
    This article is about changing our environment to meet modern needs
  •  
    Riya & Margaret, Why do you think education is so slow to change the traditional education paradigm?
Nolan C

Talk to Kids To Keep Them Safe On The Internet (VIDEO) - 2 views

  •  
    Grimes, a internet awareness specialist, has a point! Many careless teens are going on sites such as Facebook and putting things up on the site they aren't going to be able to fix when they decide they regret in! These teens are making careless mistakes that could effect how their life turns out in the future! We need to be careful about what we put on the internet! Being your child's friend on Facebook allows you to view what you need to see without breaking trust with you children! Its a win for both! Quote: "The best thing we can do is teach our kids what the pitfalls are," he explained during his Internet Awareness presentation. "What your kid posts at 15, it is going be searchable when they are 25, 35. Our kids are making mistakes for the whole world to see." "Grimes advised parents to be their child's "friend" on Facebook(NOTview through their child's page, because that would show lack of trust in your children) and see what they are posting online =. Parents should look at their child's "friend" list and find out how many are actually known and not claiming to a friend of a friend. When children are young, they are told not to talk to strangers, however with social networking the warning does not always get followed. " "Cyber Bullying is not a technology problem, it often involves friends or former friends hurting one another. He described Cyber Bullying as a small version of what terrorists do - try to alter lifestyles - in these cases those of individuals or a small group."
  •  
    Tom Grimes told parents the Internet and social networking can be wonderful tools but they must be used wisely and their children probably do not understand how to do that and it can put them at risk. "The best thing we can do is teach our kids what the pitfalls are," he explained during his Internet Awareness presentation.
Garrett E

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with on-line access scored higher in the areas of information management, communication, and the presentation of ideas. According to one article the use of instructional technology offers great promise in helping "students become independent, critical thinkers, able to find information, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
Julia B

Faceted Id/entity:Managing representation in a digital world - 0 views

  •  
    This is explaining the consequences in the internet and stuff that follows. "Awareness empowers individuals, as it gives them the ability to understand their position in a given system and use that knowledge to operate more effectively. In social interactions, people want to be aware of their own presentation, of what is appropriate in the given context, and how others perceive them"
  •  
    How to be aware
Liz D

Let's keep children safe in the cyber age | BlueRidgeNow.com - 0 views

  •  
    This talks about the kids and the effects it could have on them. "October 2011 marks the eighth annual National Cyber Security Awareness Month, sponsored by the Department of Homeland Security. The overarching theme for National Cyber Security Awareness Month is "Our Shared Responsibility," which reflects the interconnectedness of the modern world and the message that all computer users have a role in securing cyberspace. This is especially true when it comes to keeping our children safe in a worldwide environment."
  •  
    This article talks about the safety of our children in this day in age. Parents should watch their children while they surf the web
Blaine I

What effect has the internet had on healthcare? | Technology | The Observer - 0 views

  •  
    The affect on the digital healthcare system. It is on how internet messes with your wellness.
  •  
    Blaine, Is it the internet or the tools used to access the internet as used by humans?
Kerrie D

Cyber bullying: Cyber bullying - 0 views

  • Cyber Bullying is a major type of bullying around the world that is escalating dramatically.
  • Children, Teens, even Adults are getting bullied online. Especially on online games where others can communicate.
  •     Cyber bullying is a huge deal around the world.
  • ...1 more annotation...
  •   Cyber bullying has effected a lot of people around the world.
  •  
    "Cyber Bullying is a major type of bullying around the world that is escalating dramatically. "
  •  
    Everyone is getting bullied online. When you are able to communicate with other people online and in virtual worlds like xbox live and the playstation network, you much more open to cyberbulling.
« First ‹ Previous 61 - 72 of 72
Showing 20 items per page