Skip to main content

Home/ Diigo In Education/ Group items tagged hacks

Rss Feed Group items tagged

anonymous

(10) Our Hands Are Clean: Rupert Murdoch and the Betrayal of the Public Trust | text2cloud - 22 views

  •  
    The role of ethics in the world of new media journalism is uncharted. What can we learn from analyzing the collapse of News of the World and the response of the Murdoch media empire to revelations that its reporters hacked the phones of the parents of murdered children?
Brian Davis

Chrome for iOS: Send A Webpage Back To Safari Via Bookmarklet - MacStories - 9 views

  •  
    javascript:window.open('ichromy://http'+location.href.substring(4)); This is how I made the chrome bookmarklet for Diigo. This is my first functional bookmarklet hack!
Rachel Hinton

Colleges rush to create cybersecurity soldiers - 17 views

  •  
    The now infamous computer hacks infuriated consumers who had personal information compromised and Hollywood honchos who had embarrassing emails made public. But headline-grabbing computer intrusions are only a fraction of what is going on in the Wild West of cybercrime. According to Nextgov, the online resource for federal technology decision makers, energy giant BP faces 50,000 attempts at cyberintrusion a day. The Pentagon? Ten million a day. The National Nuclear Security Administration? Another 10 million. Dramatic websites from two major computer security companies, Norse Corp. (http://map.ipviking.com) and Kaspersky Lab (https://cybermap.kasper sky.com) display vivid real-time maps of ongoing cyberwarfare being waged around the globe. That has sparked a mad dash for cybersecurity experts - and another mad dash to recruit and educate students in that field.
Randolph Hollingsworth

Make Your Own E-Books with Pandoc - ProfHacker - The Chronicle of Higher Education - 80 views

  •  
    learning how to make an e-book via crowdsourcing your own blog (example from sociologist Kieran Healy) - or online journal (example from J of Southern Religion) - or open-access book (Mark Sample's Hacking the Academy) - recommending Pandoc but also refers to Sigil, Anthologize
anonymous

Hacking lessons for teens reduce security threats | opensource.com - 40 views

  •  
    Teaching students to see the big picture in computer science rather than just functionality of programming.
Thieme Hennis

Design lessons for programmers, curated by top designers | Hack Design - 2 views

  •  
    A free design course to encourage programmers/hackers into developing solid design skills, but most of the content is relevant to anyone wanting to improve their design skills (covers design in general including industrial design, web design, UX, etc). Some excellent resources are already available.
  •  
    "An easy to follow design course for hackers who do amazing things. Receive a design lesson in your inbox each week, hand crafted by a design pro. Learn at your own pace, and apply it to your real life work - no fake projects here."
Stacy Olson

Google Doc Template Hack! | Tech Integration | Cycles of Learning - 0 views

  •  
    How to template a Google doc without sending it to the Gallery
Roland Gesthuizen

Budget storage for iPads | Information Literacy - 129 views

  •  
    "When we first purchased our class set of iPads we needed a secure storage and charging solution. Unfortunately the purpose built trolleys were too expensive. At $4.50 each these drying racks were a great alternative while we saved up the money."
Jac Londe

Truly random numbers - 41 views

  • At a quantum scale, the motion of electrons and protons is completely and genuinely random, since it doesn’t follow a clear path of cause and effect. You basically have no idea what’s going to happen. If you can measure this somehow, than you’ve got yourself an absolutely random value.
  • “If you want to defeat an adversary who is trying to hack into your system, basically you need large quantities of random numbers,”  Sussman said.
  • “…a truly random number generator will provide impenetrable encryption for communications — be they military transmissions, secure banking, or online purchasing — that underpin the modern connected world.”
  • ...3 more annotations...
  • The researchers used pulses of laser light, which only last a trillionth of a second, that were directed through a diamond. The light comes and goes through the diamond, however when it exists it’s changed, since it has to pass through quantum vacuum fluctuations, the microscopic flickering of the amount of energy in a point in space. Scientists can measure these pulses of light that emerge from the experimental set-up, measurements which are the truly random.
  • random numbers
  • with quantum physics
Ann Steckel

Georgia Tech Invokes FERPA, Cripples School's Wikis | Hack Education - 182 views

  •  
    hhhmm, this doesn't bode well for those of us who already have classroom style blogs stretching back several semesters....
  •  
    this is, indeed, a step backwards in regards to the applications of technology in education.
Roland Gesthuizen

YouTube - Crabfu $5 iphone microscope mod - 35 views

  •  
    "how to adapt a tiny field microscope with an iPhone camera and iPad"
  •  
    Amazing technology hack, adapting a cheap microscope with an iPhone to create a scientific instrument :-)
Todd Finley

Hacking Education | Union Square Ventures: A New York Venture Capital Fund Focused on E... - 0 views

  • dana boyd reminded us that "technology does not determine practice" Just shoving broadband into a group of kids, just giving them an iPhone, we can think of a gazillion designs that are valuable ... but, if you don't have a culture embedded in it, [it] becomes just another toy you can text your friends with... I've become so infinitely frustrated with... "let's just dump a bunch of laptops into a population and see what they do with it"... That doesn't work... We've watched students rip out the batteries and use them for everything else under the sun.... I don't think we can just think about the technology.... We have to think about it in a broader system.
    • Todd Finley
       
      dana boyd reminds us about technologies limitations.
david ellis

Netvibes (124) - 1 views

shared by david ellis on 22 Apr 09 - Cached
  • Programming -OK, on the programming thing, here are my thoughts.In our curriculum our objective is not as much a specific LANGUAGE. One year I may use HTML with Javascript, this past year I used LSL — what I want kids to know that when they encounter programming and coding that there are certain conventions. Some are case sensitive, some are not. How do you find out how to add to what you know about programming? Do you know where to go to find prewritten code? Can you hack it to make it work to do what you want it to do?We spend about a week – two weeks but I require they know how to handcode hyperlinks and images – they are just too important.But to take 12 weeks or 6 weeks to learn a whole language – yes maybe some value – but to me the value is HOW is the language constructed or built. What are the conventions and how do I educate myself if I am interested in pursuing. What comes out of this time is kids who say either “I never want to do that” or “this is really cool, I love coding.”They are doing very simplistic work (although the LSL object languages were pretty advanced) but since we don’t have a full course nor time in our curriculum, I do see this as an essential part of what I teach.I’m not teaching it for the language sake but for the sake of understanding the whole body of how languages work – we talk about the different languages and what they are used for as part of Intro to Computer science and have an immersive experience.To me, this is somewhat a comprimise between leaving it out entirely or forcing everyone to take 12 weeks of it. I just don’t know where 12 weeks would go in the curriculum.
Nancy Henry

Wonder How To » How To Videos & How-To Articles - 79 views

  •  
    A vast, well-indexed resource of how-to videos on just about anything you can imagine.
‹ Previous 21 - 40 of 49 Next ›
Showing 20 items per page