Wolfram|Alpha - 0 views
-
Let's say we succeed in creating a system that knows a lot, and can figure a lot out. How can we interact with it? It's going to be a website: www.wolframalpha.com. With one simple input field that gives access to a huge system, with trillions of pieces of curated data and millions of lines of algorithms.
-
Making the world's knowledge computableToday's Wolfram|Alpha is the first step in an ambitious, long-term project to make all systematic knowledge immediately computable by anyone. You enter your question or calculation, and Wolfram|Alpha uses its built-in algorithms and growing collection of data to compute the answer
In Obama's Election, a Textbook Case of History in the Making for Students This Fall - ... - 0 views
-
An article about how textbook publishers are rushing to include Obama's election in their latest books
-
One could use this article as yet another reason to show that purchasing textbooks, especially for a subject such as this, is a practice that SHOULD disappear in the near future. When you have access to ALL the world's information as well as commentary on that information, AND as well as the ability to share it electronically and contribute to the commentary, there really just is NOT a need to purchase those books anymore. Or am I completely wrong?
Remote Access: I'm Done with Edtech - 0 views
Is Technology Producing A Decline In Critical Thinking And Analysis? - 0 views
-
"As students spend more time with visual media and less time with print, evaluation methods that include visual media will give a better picture of what they actually know
-
reading develops imagination, induction, reflection and critical thinking, as well as vocabulary," Greenfield said. "Reading for pleasure is the key to developing these skills. Students today have more visual literacy and less print literacy. Many students do not read for pleasure and have not for decades."
-
"Wiring classrooms for Internet access does not enhance learning," Greenfield said.
- ...1 more annotation...
eGyanKosh: Home - 0 views
Google makes me smarter - 0 views
Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views
-
For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
-
"A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
- ...7 more annotations...
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Remote Access: Top Ten Tech Tools - 0 views
ASCD - 0 views
-
first 60 seconds of your presentation is
-
Summers and other leaders from various companies were not necessarily complaining about young people's poor grammar, punctuation, or spelling—the things we spend so much time teaching and testing in our schools
-
the complaints I heard most frequently were about fuzzy thinking and young people not knowing how to write with a real voice.
- ...35 more annotations...
Remote Access: What Business are we In? - 0 views
-
Great question: what is our core mission?
-
So if we view our resource in education and schools as being information, we will find ourselves more and more as one option among many. So I think that we need to ask the question: what is our core mission? What can we offer in classrooms and schools that can be gained nowhere else? What makes our spaces different?
Building your pLN has never been easier - 0 views
-
This website is designed to show you how to use widgets / gadgets / plugins in your work to get access to information quickly and effectively.
-
Building a PLN has just gotten easier.
-
Organizations are starting to get things together to create widgets to help academicians, authors, and others to build a very powerful PLN (personal learning network) with their igoogle or netvibes. They seem to prefer Netvibes for a couple of reasons - and I maintain an account on both, although I startup on igoogle. There are Bespoke repository service widgets and repository information widgets. They even have a page to see what these widgets do (also in this post.) Every modern student (and professor and teacher) should understand how to build a PLN.
« First
‹ Previous
241 - 260 of 312
Next ›
Last »
Showing 20▼ items per page