Skip to main content

Home/ educators/ Group items tagged Software

Rss Feed Group items tagged

Vicki Davis

Student Response Network - 0 views

  •  
    You can use a virtual response system on individual workstations. This software has a free trial.
Fred Delventhal

Skype - TLC Online Home - 0 views

  •  
    Using Skype in the Classroom Desktop Voice and Videoconferencing Software in Education Discover how to communicate and collaborate with friends, colleagues, resource experts, and other classrooms using Skype. Skype is a program that allows users to communication with voice, videoconferencing, or chat for free between computers. Create a Skype account, add contacts, and conduct free audio and video conferences between computers. Explore creative ways to use this tool to enhance teaching and learning.
Jeremy Davis

Free and Open Source Educational Software: THE MOTHER LODE! | Welcome to NCS-Tech! - 0 views

  •  
    Disk image download of thousands of open source SW titles
Vicki Davis

Evaluate VMware Infrastructure 3 (VI3) Free for 60 Days - VMware - 0 views

  •  
    Fascinating way to create virtual servers.
  •  
    This software lets you take one host PC server and this lets you virtualize servers. In Walton County - have 100 servers and 60 are virtual. All independent and have their own IP address and appear completely independent -- they have 6 blade servers. This does cost money. This would let me move the Accelerated Reader and Accounting system to separate "virtual servers" and if one needed to reboot, I could reboot a "virtual server" and not the physical server. This is from an expert IT - Jack Higgins, Network Analyst - Walton County schools in Atlanta, GA -- met by accident in the Atlanta airport. A lot of these bookmarks are from him!
Vicki Davis

Discovery Education - Inspiring Invention PSA Contest and K-12 Classroom Resources - 0 views

  •  
    Create an inspiring invention Public Service Announcement (they do want you to download the Sony creative software.) - from Sony and Discovery Education.
Henry Thiele

The Best Places To Get Royalty-Free Music & Sound Effects | Larry Ferlazzo's Websites o... - 0 views

  •  
    I don't really give details about the sites I'm listing here because they're all very similar - the music and sounds here are royalty-free and it's just an easy matter of searching and downloading them. Of course, credit should be given to the source when they're used in online projects. I've also tried avoiding sites that have obvious content not appropriate for classroom use, but something might have slipped by me. I also don't believe that any of the sites here require any software download or registration. Here are my choices for The Best Places To Get Royalty-Free Music & Sound Effects:
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

A quarter million teachers to get free wikis - 0 views

  •  
    A San Francisco wiki services provider has just finished a multiyear project under which it gave teachers all over the world 100,000 free wikis. And now, it is doubling up and getting set to give away another quarter million. The company, Wikispaces, decided in 2006 that it would make helping teachers use the collaborative software to further cooperation between students, both in their own schools and with schools in other cities and countries, a cornerstone of its business. But while Wikispaces hasn't made any money directly from the project--and in fact has incurred significant costs due to supporting the teachers' use of the wikis--co-founder Adam Frey said the company has found that the educators are just the kind of evangelists that can aid a start-up in building a business.
Terry Elliott

What We Use: The Lifehacker Editors' Favorite Software and Hardware - 0 views

  •  
    Lots of practical
Thomas Ho

Replaced By Machines: Will Efficient Social Software Take Your Job Away? - 0 views

  •  
    lots of "food for thought" With implications for education
Scott Weidig

The Best Free Software - 0 views

  •  
    Permalink for a list of 157 Free Applications for the PC and MAC. This list includes all of the top apps, and some that may suprise you. If you are into open source or freeware, this article from PCMag is a must read.
Anne Baird

Flowgram - 0 views

  •  
    An example of Flowgram from sirexkat who discusses Adventures in Microblogging Flowgram is building a new multimedia-empowered way to communicate. The Flowgram product has captured the imagination of a prestigious group of individuals with exceptional track records. Flowgram investors include Reid Hoffman (Paypal, LinkedIn), Josh Kopelman (Firstround Capital, Half.com), the founders of Flickr, Bud Colligan (founding CEO of Macromedia), Rajeev Motwani (Stanford) and members of the founding team of WebEx and Tibco Software.
Vicki Davis

Wisdomap - 0 views

  •  
    Cool, amazing mind mapping tool.
  •  
    Cool 3d mind mapping software availablef or free. This is fascinating.
Ben W

Mr. Presentation - 0 views

  •  
    A quick guide to making a good presentation using presentation software. Cute & fun.
Reggie Ryan

Collaboration and Community Constituents: An investigation into the key elements that b... - 0 views

  • They see the broad difference between the two as being the amount of self-determination or self-direction; with cooperative learning being very much teacher-controlled and collaborative learning being learner-controlled.
  • However, experientially I believe that what distinguishes collaboration from cooperation comes down to exactly what is shared. When cooperating, it is only physical resources (objects, time, money) or intellectual resources (knowledge, expertise) that are shared. Whereas when collaborating, in addition to these shared physical and intellectual resources, are shared goals, responsibilities, values, beliefs and attitudes. Some of these intellectual resources (both cognitive and affective) may become shared through the practice of cooperation but with collaboration they are factored in from the start. From this collaborative sharing comes synergy which adds value by producing something new and unique.
  • There is another important area that needs to be addressed with collaborative learning software which is related to communication; namely knowledge construction. It has been noted by researches that threaded discourse, of the type found in Lotus Notes and the majority Web-based conferencing software, actually works against convergent thinking processes over time (Hiltz, 1986; Harassim, 1990; Eastmond, 1994). It is found that this can have "a negative effect both on the learner's efforts to synthesize ideas, and on collaborative processes which become increasingly fragmented as discussion threads and individual interests diverge." (Hewitt, 1997).
  • ...1 more annotation...
    • Reggie Ryan
       
      Commenting on threaded discussions and their inability to foster creative thinking. This leads to using wikis instead.
  •  
    Collaboration versus Cooperation in networked environment.
Steve Madsen

Values Exchange Selected Oz schools - 0 views

  •  
    2008: software written in New Zealand. A pilot program where students respond to case studies which involve values. Responses are quantitatively collated. Good potential for further research for more academic inclined students.
  •  
    Values Exchange. Students able to discuss current interests. Has formal approach to discussions.
anonymous

Mnemograph: Web Based Timeline Software - 0 views

    • Clif Mims
       
      This web application could be used with the following: -Research/ Reports in any content area -Lab reports -Data collection/ analysis (research journal/ log, data trail, notes, formation of ideas and early possible findings, etc.) -Pre- and post-assessment -Ogranizer -Group or whole-class projects -Self-paced instruction -Journal writing exercise spanning an extended timeframe -Group/ Project management
  •  
    This web application could be used with the following: -Research/ Reports in any content area -Lab reports -Data collection/ analysis (research journal/ log, data trail, notes, formation of ideas and early possible findings, etc.) -Pre- and post-assessment -Ogranizer -Group or whole-class projects -Self-paced instruction -Journal writing exercise spanning an extended timeframe -Group/ Project management -In IDT 7/8052
Danielle Klaus

NoodleTools : MLA / APA Bibliography Composer, Notecards, Free Research Tools - 2 views

  •  
    NoodleTools provides innovative software that teaches students and supports teachers and librarians throughout the entire research process. *Search intelligently *Assess the quality of results *Record, organize and synthesize information using online notecards *Format your bibliography in MLA or APA style
Anne Baird

Online Survey Software - Web Survey Tool - 0 views

  •  
    Option to use free service to create online surveys, polls, quizes etc
« First ‹ Previous 101 - 120 of 372 Next › Last »
Showing 20 items per page