Skip to main content

Home/ Digiteen/ Group items tagged systems

Rss Feed Group items tagged

Steve Madsen

Why Schools are Turning to Google Apps - 0 views

  •  
    Today, the entire public school system of Oregon will embrace Google Apps. 400,000 Students, teachers, and administrators will have access to a common e-mail and chat system, cloud-based collaboration tools, and a robust multimedia streaming service.
  •  
    How can students use digital technologies to take best advantage of opportunities in education? Will there be new 'basic' skills to learn?
Savana R

Invading our privacy on the Internet - Los Angeles Times - 0 views

  • privacy is among our inalienable rights
  •  
    People tracking our personal life on the internet can be bad. People can steal other peoples identity. "Internet companies track and sell advertisers virtually everything we do online. That's why a 'do not track me' system is vital. If Washington fails to act, California should create its own system."
Erin B

Xbox Live - Wikipedia, the free encyclopedia - 0 views

shared by Erin B on 05 Oct 09 - Cached
  •  
    Xbox Live is a great example of internet commerce and freedom. "Xbox Live (trademarked as Xbox LIVE[1]) is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. It is currently the only online gaming service (on consoles) that charges users a fee to play multiplayer gaming. It was first made available to the Xbox system in 2002. An updated version of the service became available for the Xbox 360 console at that system's launch in 2005. On the Windows platform, the service is named Games for Windows - Live, which makes most aspects of the system available on Windows computers. Microsoft has announced plans to extend Live to other platforms such as handhelds and mobile phones as part of the Live Anywhere initiative.[2]"
Alan K

Legal governance, risk management, and compliance - Wikipedia, the free encyclopedia - 1 views

  •  
    Legal Compliance is talked about in this article. It has two subsections, Legal Consistency and Legal Completeness. There are processes, rules, tools, and systems when it comes to Legal Compliance.
  •  
    This really helped me do my part of the wiki. Very good choice =D.
Miller S.

How Adult Learners are Using the Internet - 0 views

  • Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
    • Miller S.
       
      Adults using the internet
  •  
    Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
Julie Lindsay

Learn 4 Life » Educators in Virtual Worlds on Open Sim - the pioneers… - 0 views

  •  
    Watch the interview with students below in Real Life and Avatar form and then the next one with Vicki see how eloquently she comments on these new learning landscapes. I would hold that interview up as a seminal exemplar of someone who knows exactly what they are doing in this field and if I had my way it would be required viewing for anyone who has doubts about the efficacy of using Web 2.0 tools in education and the systems and infrastructure that can be built around them. I would also point people to the award winning wiki on the global Flat Classroom Project for further reference - the Digiteen project is just one small subset of that whole activity.
  •  
    Excellent blog post about the pioneers in virtual world education. Excerpt here is from teh section about Vicki Davis and her class who built Digiteen Island in Reaction Grid Open Sim. Watch the interview with students below in Real Life and Avatar form and then the next one with Vicki see how eloquently she comments on these new learning landscapes. I would hold that interview up as a seminal exemplar of someone who knows exactly what they are doing in this field and if I had my way it would be required viewing for anyone who has doubts about the efficacy of using Web 2.0 tools in education and the systems and infrastructure that can be built around them. I would also point people to the award winning wiki on the global Flat Classroom Project for further reference - the Digiteen project is just one small subset of that whole activity.
Riya P

A Parents Guide to Cyberbullying - 0 views

  • Cyberbullying is threatening, lying about, stalking or otherwise harassing a person online or via other electronic communication devices like a cell phone
  • How to Prevent Your Child from Being Victimized
  • Be your child’s support system
  • ...4 more annotations...
  • Be firm.
  • Know your child
  • Know the danger signs.
  • Educate
  •  
    CYBERBULLY Many parent do not what to do in case of cyberbullying. The more prepared they are, the more likely they are to save their child from cyberbullying. "Be your child's support system. Be firm. Know your child. Know the danger signs. Educate."
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Callie S

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
Savana R

Lack of Privacy on the Internet - 0 views

  •  
    Facebook has upgraded more now days and you don't have as much privacy. Peoples life could be in danger if they have someone watching them and they don't know it. "Facebook's privacy system seems like it doesn't exist any more. According to the data below, around 2010, almost all your information is available to all. Back then, the situation was worse, what about today? Ever since the Facebook timeline was released, people complained greatly about the privacy issue. If the person could create an updated version of this infograph, I wonder where he would put the 2011 data ? "
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Jenna A

Literacy Rate - How Many Are Illiterate - 0 views

  •  
    "The literacy rate in the US has many educators in search of answers about this problem that has plagued our country for decades. Instead of decreasing, the numbers of literacy has steadily increased over the years. This raises a lot of questions about our education system, how it is ran, and why there is such a problem with illiterate people in our country. The NAAL (National Assessment of Adult Literacy) administered tests which revealed that an estimated 14% of US residents would have extreme difficulty with reading and written comprehension. These people can legally be defined as illiterate. This could lead to numerous problems for these people now and in the future. When looking to apply for a job, there are forms that have to be filled out. Adults with literacy issues are unable to fill out these forms which decrease their chances of getting a job and raises unemployment issues."
  •  
    This tells about the way literacy has increased in the US, and how people with low literacy rates are illiterate.
Matt B

Gale World History In Context - Document - 0 views

  •  
    Never has this fact been starker than in alarming statistics on Internet security breaches released by Incidents.org which tracks system incursions around the world.
Kayleigh b

Copyright at CSUS - 0 views

  •  
    copyright basics - connecticut state university library system
Vicki Davis

France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 0 views

  •  
    The French data protection authority said Tuesday that Google's new privacy policy appeared to violate European Union law, raising the stakes in a showdown with the company only days before it planned to put the new system into effect.
Miller S.

Usenet: Not dead yet - 0 views

  •  
    As with anything that has been around as long as Usenet, and been so important to so many people, there's a great deal of folklore that's grown up around it, reflected in terms like "Big 8" and "The Great Renaming," "Netiquette" and "Never-ending September." Usenet's technological underpinnings predate its association with the Internet, resting on dial-up-based store-and-forward e-mail BBS systems and UUCP protocols and programs. Although its name makes it sound monolithic, Usenet is perhaps best described as a huge, loose collection of informal information-exchange communities that have little in common beyond their naming convention and their reliance on the Network News Transfer Protocol used to manage Usenet messages. The basic unit is the newsgroup, a threaded discussion devoted to a topic. Newsgroups are organized by topic into hierarchies. Google Groups, which provides access to Usenet, lists more than 1,000 top-level hierarchies. Many of these are named for a country or city, company or product. The Microsoft hierarchy, for example, includes 3,337 newsgroups, such as microsoft.public.mac.office.entourage, microsoft.public.scripting.vbscript and microsoft.public.outlook.calendaring.
Becca B

Online Etiquette - 1 views

  • However, some things don't change: the practices of courtesy and respect that apply in the ordinary classroom also apply online, and require even more attention
  • Participate
  • Be persistent
  • ...8 more annotations...
  • Share tips
  • Think before you push the Send button
  • Remember that we can't see the grin on your face when you make a sarcastic comment,
  • Ask for feedback
  • "Flaming,"
  • unacceptable
  • derogatory or inappropriate comments
  • Plagiarism
  •  
    " 1. Participate. In the online environment, it's not enough to show up! We need to hear your voice to feel your presence, and we especially need your comments to add to the information, the shared learning, and the sense of community in each class. 2. Be persistent. Remember that we're all working in a fairly new environment. If you run into any difficulties, don't wait! Send an email immediately to your instructor or post on the Bulletin Board. Most problems are easily solved, but your instructor (and your course colleagues) have to hear from you before they can help. 3. Share tips, helps, and questions. For many of us, taking online courses is a new frontier. There are no dumb questions, and even if you think your solution is obvious, please share it by posting it on the Bulletin Board or other communication tool. 4. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? While you can't anticipate all reactions, do read over what you've written before you send it. 5. Remember that we can't see the grin on your face when you make a sarcastic comment, we can't see the concern on your face if you only say a couple of words, and we can't read your mind and fill in the gaps if you abbreviate your comments. So: help us "see" you by explaining your ideas fully. 6. Ask for feedback if you're not sure how your ideas and comments will be taken. Remember there's a person on the other side. If you disagree with what someone has said, practice all your communication skills as you express that disagreement. 7. "Flaming," or flying off the handle and ranting at someone else is unacceptable; it's the equivalent of having a tantrum, something most of us wouldn't do in an onsite, face to face classroom. 8. Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to the sa
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
    • anonymous
       
      Impact > government
1 - 20 of 46 Next › Last »
Showing 20 items per page