Skip to main content

Home/ Digiteen/ Group items tagged pass

Rss Feed Group items tagged

Steve Madsen

Virgin Blue Mobile Boarding pass - 0 views

  •  
    Virgin Blue has launched a revolutionary, innovative new process to check in and board on domestic flights via a traveller's mobile called "Check-Mate". Gone are the days of booking the flight in advance at a desktop computer, getting to the airport, lining up to check-in and getting a printed boarding pass, with the new Check-Mate process eliminating all paper boarding passes in favour of electronic boarding passes on mobile devices including mobile phones, BlackBerry Smartphones and iPhones.
  •  
    Will this speed up boarding an aircraft? How? Is this considered an innovation in 2010?
October H

FTC Urges Congress to Pass Digital-Privacy Law - WSJ.com - 0 views

  •  
    "Frustrated by a flood of privacy violations, the Federal Trade Commission on monday issued a strong call for commercial-data collectors to adopt better privacy practices and called for Congress to pass comprehensive privacy legislation."
  •  
    This is a blog about the FTC wanting the Congress passing a new privacy law.
Becca B

10 Etiquette Tips For An Online Course - 0 views

  • 1.) Participation — unlike classroom settings, you can’t just “show up” and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination — do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing — ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don’t keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread – before you press the SEND button, think about what you have written; you can’t take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express — classmates and teachers cannot “see you”, so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback — give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect — do not put down anyone’s ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution – be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn’t say it in person, don’t say it online. 9.) Cheating – treat the class like an in-room course. Do not cheat, it only hurts your learning opportunities. 10.) Work hard! — to get the most out of it, you’ve got to put your best into it! Work hard and achieve results!
  •  
    "1.) Participation - unlike classroom settings, you can't just "show up" and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination - do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing - ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don't keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread - before you press the SEND button, think about what you have written; you can't take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express - classmates and teachers cannot "see you", so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback - give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect - do not put down anyone's ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution - be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn't say it in person, don't say it online. 9.) Cheating - treat the class like an in-room course. Do not cheat, it only hurts your learning
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Kelby W

Protecting Personal Privacy Online | Common Sense Media - 2 views

  •  
    This is an article to help kids learn the risks of revealing personal information online.  "Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created can get copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. Each time your child fills out a profile without privacy controls, comments on something, posts a video, or texts a picture of themselves to friends, they potentially reveal themselves to the world. Why privacy matters Digital life is very public and often permanent. If our kids don't protect their privacy, what they do online will create digital footprints that wander and persist. Something that happens on the spur of the moment -- a funny picture, a certain post -- can resurface years later. And if kids aren't careful, their reputations can get away from them and third parties -- like marketers or potential employers -- can access what kids thought was private information. Your kids may think they just sent something to a friend -- but that friend can send it to a friend's friend, who can send it to their friends' friends, and so on. That's how secrets become headlines and how false information spreads fast and furiously. The stakes only rise when we remember that everything takes place in front of huge invisible audiences. Kids' deepest secrets can be shared with thousands of people they've never even met. New technologies make controlling privacy more challenging. With GPS-enable cell phones and location-sharing programs, kids can post their whereabouts. This information can go out to friends, strangers, and companies who will show them ads targeted to their location.  Advice for parents Explain that nothing is really private. No matter what kids think. Privacy settings aren't infallible. It's up to kids to protect themselves by thinking t
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Peter J

'Fesbuk' is the internet to many in Indonesia - Islam - NZ Herald News - 0 views

  •  
    Facebook has been able to show how the internet is able to pass cultural barriers, and has become almost the same thing as the internet in Indonesia. This has caused some in the Muslim religion to call for a ban on Facebook because it breaks cultural barriers and allows for actions that aren't approved by the religion. 
Steve Madsen

Student hoaxes world's media with fake Wiki quote - web - Technology - 0 views

  •  
    he said he was testing how our globalised, increasingly internet-dependent media was upholding accuracy and accountability in an age of instant news. His report card: Wikipedia passed. Journalism flunked.
  •  
    An example of material not confirmed.
Rachel H

Top 10 Healthy Internet Habits You Can Practice - 0 views

  • 10. Music: Listen to and discover new music. Listen to classical music to help you stay relaxed and focused. Find free music online to listen to. 9. Language: Learn a second language. This can help you when vacationing and it looks great on your resume. You can earn more money in your field if you know another language. 8. Health: Get healthier with diet plans, meal planning and exercise plans. Join an online community with people who have the same health goals as you: lose weight, get in shape, gain muscle, or just stay healthy. Plan your meals. Get healthy recipes. 7. Money: Manage your money. Read articles and newsletters from finance experts. Learn how to stick to a budget. Get discounts and coupons online to help save money. 6. Donate: Find your favorite charities and organizations online and donate your money, time, blood, etc. Many are eligible for tax deductions. Donate to help find a cure for cancer, help fund a Native American school, give aid in natural disasters…There are so many good causes out there. 5. News: Check out the current events around the world. There is more than just bad news out there. There are good people doing great things. 4. Education: Learn something new with an online course. What have you always wanted to learn how to do? You can also find courses online that can help you advance in your career. 3. Photos: Create an online photo album. Keep a photo album online to save space from printed photos. Your pictures will stay fresh. You can print them out when you want to for frames or gifts. You can share them with relatives and friends who live far away. 2. Ancestry: Research your ancestry and create a family tree. Talk to your mom, dad, siblings, and other relatives to get the names of your grandparents, aunts, uncles, and more. Map your ancestry online and create something to pass down to your kids. 1. Maps: Use maps to show your kids where they live. Print out maps of places you would like to visit. When you are board take a road trip. Print out some great restaurants nearby and make a day of it.
Ashley M

Plagiarism.org : Learning Center : Plagiarism Definitions, Tips on avoiding Plagiarism,... - 0 views

  • According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off (the ideas or words of another) as one's own to use (another's production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.
    • Ashley M
       
      This information helps us learn what plagiarism is and how it can be a problem in schools.
James D

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
Vicki Davis

Can the law keep up with technology? - CNN.com - 2 views

  • Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
  • it's typically difficult to predict or anticipate technology innovations.
  • Is the Web a unique, separate space or is it really an extension of real space?
  • ...7 more annotations...
  • "We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
  • the school provided alternative reasons for denying Snyder a degree
  • Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
  • In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
  • The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
  • "It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
  • "We should never expect that the judges are going to save us from our own worst impulses."
  •  
    An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues. This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
  •  
    Excellent article about the changing legal issues of the Internet.
Margaret O.

If We Can Change The Way We Communicate, We Can Change The Way We Educate | Fox News - 0 views

  • Many American classrooms are almost indistinguishable from those that students' grandparents attended.  Twenty-something students still sit in desks facing the front of the classroom, with textbooks, listening to a generalist teacher.
  • A new perspective is needed.  Americans need to consider the fundamental question:  How can we most effectively teach kids the skills they need? 
  • Traditional schools may be best for some students, while others will thrive in moire high-tech learning centers. 
  • ...3 more annotations...
  • Parents can augment or even replace their children's traditional school experience with programs from companies like K-12.  This service allows parents to enroll children in virtual schools or purchase specific curriculum.  Traditional materials—worksheets, books, and other physical materials—are combined with online resources, including multimedia presentations. 
  • If We Can Change the Way We Communicate, We Can Change the Way We Educate
  • Steve Jobs' passing last week encouraged Americans to consider how technology has transformed our lives.  Fueled by the creative genius of men like Jobs, new technology has emerged allowing us to better keep in touch with friends and family, access entertainment and information, and perform work from home or wherever we happen to be at that moment.  While we've successfully integrated technology into our workplaces and personal lives, we've been comparatively slow to apply technology's power to other areas of life, like education.  That needs to change.
  •  
    This changes parents' perspectives about letting their child use technology.
  •  
    This article is about changing our environment to meet modern needs
  •  
    Riya & Margaret, Why do you think education is so slow to change the traditional education paradigm?
1 - 13 of 13
Showing 20 items per page