Skip to main content

Home/ Digiteen/ Group items tagged office

Rss Feed Group items tagged

JocelynD_mca MCA

HealthyComputing - The Premier Source For Computer and Office Ergonomics - 0 views

  •  
    The premier website for office ergonomics and computer ergonomics information, with buyer's guides, setup guides, and health information about wrist pain and back pain.
  •  
    The premier website for office ergonomics and computer ergonomics information, with buyer's guides, setup guides, and health information about wrist pain and back pain.
Haley M

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
Alan K

U.S. Copyright Office - Frequently Asked Questions - 3 views

  •  
    A F.A.Q page of the most commonly asked questions about Copyright. If you have a question about Copyright, it is probably answered here.
Alan K

U.S. Copyright Office - Copyright Law of the United States - 1 views

  •  
    The Chapters and Appendixes on an official Copyrighting website supported by the government. The Chapters and Appendixes all contain different kinds of information relating to Copyrighting.
Miller S.

Usenet: Not dead yet - 0 views

  •  
    As with anything that has been around as long as Usenet, and been so important to so many people, there's a great deal of folklore that's grown up around it, reflected in terms like "Big 8" and "The Great Renaming," "Netiquette" and "Never-ending September." Usenet's technological underpinnings predate its association with the Internet, resting on dial-up-based store-and-forward e-mail BBS systems and UUCP protocols and programs. Although its name makes it sound monolithic, Usenet is perhaps best described as a huge, loose collection of informal information-exchange communities that have little in common beyond their naming convention and their reliance on the Network News Transfer Protocol used to manage Usenet messages. The basic unit is the newsgroup, a threaded discussion devoted to a topic. Newsgroups are organized by topic into hierarchies. Google Groups, which provides access to Usenet, lists more than 1,000 top-level hierarchies. Many of these are named for a country or city, company or product. The Microsoft hierarchy, for example, includes 3,337 newsgroups, such as microsoft.public.mac.office.entourage, microsoft.public.scripting.vbscript and microsoft.public.outlook.calendaring.
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
anonymous

Make Internet Fax Services Work For You - washingtonpost.com - 0 views

  •  
    Fax machines have become a pain to work with for many workers in their office. Whether it's the special type of paper, the ink cartridges and all. It has become less efficient and many are trying to make the internet fax services work for them.
Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Nicholas C

Copyright and Fair Use - UMUC Library - 2 views

  • An Introduction to Fair Use What is Fair Use? Fair use is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1). Deciding whether the use of a work is fair IS NOT a science. There are no set guidelines that are universally accepted. Instead, the individual who wants to use a copyrighted work must weigh four factors:
  •  
    More about copyright.
  •  
    This page has lots of information about fair use.
Will W

U.S. Copyright Office - 0 views

  •  
    Here is a copy of the U.S. copyright laws
Maggie B

Etiquette for Using Personal Technology at Work - Career Couch - 0 views

  •  
    Q. Your company allows employees to bring their own portable electronic devices - like phones and tablets - to the office. Does that mean you should feel free to use them whenever you see fit? A.
Maggie B

Etiquette Survival - 0 views

  •  
    So instead of suffering through inane PowerPoint presentations at a recent Internet industry conference, the chairman of Los Angeles-based BizRate.com flipped open his laptop and began sending e-mails to colleagues at the office. Thanks to wireless Internet access throughout the conference area, Mohit paid attention when speakers interested him--and got real work done when they didn't.
Joshua C

U.S. Copyright Office - 1 views

  •  
    The basic access site for all U.S copyright, laws, procedures, and registration.
Will W

U.S. Copyright Office - Fair Use - 2 views

  •  
    Information on fair use and copyright
  •  
    The guidelines that users must abide by when they are using copyrighted material under the fair use category.
  •  
    Here are some copyright fair use laws
Ashley M

digiteen2008 - Digital Literacy - 0 views

  • Some teachers are trying to use digital literacy in there classrooms daily to try to help students become involved. Our teachers use overhead projectors, smartboards, and televisions.Many of us use computers in our classes. If we do not learn how to use computers we could soon be separated by the digital divide. The digital divide could end up leaving some of us jobless. We need to be able to use all of the technology we have access to so we can succeed. In a article called "Digitally addicted kids threaten to return to civilization to the dark ages" a girl named Megan Meier committed suicide due to Cyber bullying. A kid named Josh Evans did this, who later turned out to be Megan's ex boyfriends mom Lori Drew. There are so many examples of digital literacy. We use them in everyday life. We use computers all the time, don’t we? I know if you work in an office then you do. Also, Teens are in love with text messages, although text messaging can be very harmful. While texting you could be bullying someone. Like I said before about computers, not only do business people use them, but parents and teens, and maybe some younger children. Teens get in chat rooms all the time. Some probably don’t even know what they are getting into. In chat rooms people can be pushed to do something or even be bullied. Chat rooms and the use of text messaging can be harmful.
    • Ashley M
       
      This information is very informative.
  • The digital divide could end up leaving some of us jobless
    • Ashley M
       
      This sentence is very true. The information in the following paragraph explains how the digital divide could leave some of us jobless.
  • Tasks are being accomplished with the use of technology more than ever.
    • Ashley M
       
      I find this fact very true.
  • ...3 more annotations...
  • Relying too much on technology is a problem because it isn't always reliable.
    • Ashley M
       
      I also find this very true..The following statement explains how relying on technology too much could be a negative thing.
  • Digital literacy is trying to teach basic computer concepts and skills. Literacy isn’t being able to read and write, like used to be. It deals with being able to tell the difference between a real and fake website.
    • Ashley M
       
      This is a great definition of what Digital Literact is.
  • Teachers are beginning to use overhead projectors, clickers, and television more
    • Ashley M
       
      This statement explains how our world is relying more on technology each day.
  •  
    This page shows that things bookmarked digital_literacy through the group automatically go to the students in the project. The teachers (who all use diigo) just tag throughout the year to have things ready to go into the wiki when it is time for the project.
  •  
    This is last years information on digital literacy.
Hayes G.

Privacy - Wikipedia, the free encyclopedia - 0 views

    • Hayes G.
       
      Privacy is something that everyone needs to have, especially on the internet.
  • Privacy (from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively
Johnny H

Fair Use - Columbia Copyright Advisory Office - 1 views

  •  
    " When do you need to think about fair use? Some example situations: Uploading materials to CourseWorks or another server. Clipping and copying materials into innovative teaching tools. Posting materials for distance learning. Developing databases of copyrighted works for research. Sharing articles and other materials with colleagues. Developing digital libraries. Placing copies on library reserves." this tells you about when you need to think about fair use while doing something for school, work, or a project.
Margaret O.

Teaching About the Web Includes Troublesome Parts - NYTimes.com - 0 views

  • Teaching About Web Includes Troublesome Parts
  • When Kevin Jenkins wanted to teach his fourth-grade students at Spangler Elementary here how to use the Internet, he created a site where they could post photographs, drawings and surveys.
  • And they did. But to his dismay, some of his students posted surveys like “Who’s the most popular classmate?” and “Who’s the best-liked?” Mr. Jenkins’s students “liked being able to express themselves in a place where they’re basically by themselves at a computer,” he said. “They’re not thinking that everyone’s going to see it.”
  • ...4 more annotations...
  • The class listened as Mr. Jenkins read a story about a girl who got annoyed when her parents quizzed her about details from her online journal. Lucas Navarrete, 13, asked, “What’s their right to read her personal stuff?” “Maybe they’re worried,” suggested Morgan Windham, a soft-spoken girl. “It’s public!” argued Aren Santos. “O.K., O.K., if it was a personal diary and they read it, would you be happy?” Lucas asked. “They have no right, see?” Mr. Jenkins asked the class if there is a difference between a private diary on paper and a public online diary. But the class could not agree. “I would just keep it to myself and tell only people that were really, really close to me,” Cindy Nguyen said after class. “We want to have our personal, private space.” That blurred line between public and private space is what Common Sense tries to address. “That sense of invulnerability that high school students tend to have, thinking they can control everything, before the Internet there may have been some truth to that,” said Ted Brodheim, chief information officer for the New York City Department of Education. “I don’t think they fully grasp that when they make some of these decisions, it’s not something they can pull back from.”
  • And the Internet is where children are growing up. The average young person spends seven and a half hours a day with a computer, television or smart phone, according to a January study from the Kaiser Family Foundation. Considering that the time is mostly outside of school, the results suggest that almost every extracurricular hour is devo
  • “You want to light a fire under someone’s fanny?” said Liz Perle, editor in chief of Common Sense Media. “Have your child post something that is close to a hate crime.”
  • “The messes they get into with friends, or jumping onto someone’s site and sending a message,” she said. “They don’t know, sometimes, how to manage the social, emotional stuff that comes up.”
  •  
    Students are now growing up online: we need to know that things we post can and will affect our personal and future business lives. It's not private, and we need to know to treat each other online.
1 - 20 of 20
Showing 20 items per page