Skip to main content

Home/ educators/ Group items tagged Sound

Rss Feed Group items tagged

Martin Burrett

Fun with Music - 4 views

  •  
    This is a nicely designed musical resource from the San Francisco Symphony. Explore music, instruments, how music is composed and more. The radio area has a good selection of classical tracks to listen to with your class. http://ictmagic.wikispaces.com/Music%2C+Sound+%26+Podcasts
Cara Whitehead

SpellingCity for iPhone, iPad, and iPod touch on the iTunes App Store - 3 views

  •  
    VocabularySpellingCity is a fun way to learn spelling and vocabulary words by playing engaging learning games using any word list. The most popular activities are Spelling TestMe, HangMouse, and our vocabulary games, available to Premium Members. The most popular word lists are Sound Alikes, Compound Words, Hunger Games and SAT Words. This is a free app!
Martin Burrett

Interactive Ear - 12 views

  •  
    Use this interactive online ear diagram to examine the workings of how we hear sound. You can embed the ear on to your website (much better that embedding a website in to your ear!) Found via @WengersToyBus http://ictmagic.wikispaces.com/Science
Vicki Davis

Rebranding: "MOOC" to "CaS" | Inside Higher Ed - 3 views

  •  
    Another alternative is to not use the term "MOOC" and call it a Cas". (another hat tip to Stephen Downes for this article). I'm not sure that changing the name really will change what is a movement to learn online. Yes, it needs to be verifiable and so many things need to happen, but sometimes I find it odd how higher ed flees from anything that sounds trendy. Why not just Make Moocs better. Anyway, realize that higher ed has woken up and realized something significant is happening, how they will respond is yet to be seen. Says the author: "The thing formerly known as a MOOC will now be called a CaS.   CaS:  Course at Scale."
Vicki Davis

Crypto Locker Virus Holds Your Computer Hostage | WebProNews - 2 views

  •  
    Ransomware is a new kind of malware. The worst Ransomware to hit in some time is the Crypto virus. This virus encrypts your hard drive and you have to send them a $300 certificate (untraceable) so they'll give you the encryption key to decrypt your drive and get your data back. In an interesting twist, the US government disabled the servers running this ransomware scan and now all of the people with the virus have no hope of getting their decryption keys. This is another reason you should be very careful NOT to open suspicious attachments even from legitimate sounding sources. (Many of these messages appeared to be from Fedex and UPS.) The greatest internet filter ever created is the human brain. Educate teachers and others - not through fear but through a skeptical empowerment that always thinks before it clicks and especially before it downloads.
David Wetzel

6 Tips and Tricks for Using Interactive White Boards - 14 views

  •  
    Interactive whiteboards (IWB) allow science and math teachers to teach multi-sensory lessons, seamlessly jumping from one type of media to another. Interactive science or math lessons can easily integrate text, sound, video, and graphics based on the tactile nature of the IWB.
Rick Beach

The Tate Movie Project / Home - 19 views

  •  
    An animation creation site designed to appeal to children aged 5-13 and will enable them to explore animation, scripting, editing and sound effects
Kelly Faulkner

DeClutter « Conroyp.com - 11 views

  •  
    don't get me wrong. i love my twitter pln. but sometimes there are threads i could do without - like the recent soccer world cup conversations that went on for...a long time. or the constant "i checked in at ...on foursquare!" posts that i couldn't care less about. declutter will hide whatever keywords you choose, using a bookmarklet, so your stream can focus on what's important to you. sorry if that sounds like an advert, but i've been waiting for a tool like this!
Patti Porto

Auditorium - 0 views

  • Auditorium is about the process of discovery and play. There are no right or wrong answers; there are many ways to solve every puzzle. To get started, fill up the first audio container.
  •  
    Interesting puzzle combining motion and sound
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jeff Johnson

Some schools say no to energy drinks (Newsday.com) - 0 views

  •  
    They can be popular because they're sweet, they give you a lift and they have hip-sounding names like Red Bull and Spike Shooter. But school officials across the country aren't as buzzed about caffeinated energy drinks as some of their students. They're worried about young people gulping down too much caffeine _ and getting so hyper that they lose focus on their studies.
anonymous

School AUP 2.0 | Main / HomePage browse - 0 views

  •  
    Welcome to School AUP 2.0 This is a dynamic document designed to support teachers, school media specialists, and education leaders in developing, maintaining, and enforcing policies designed to: 1. Promote the most effective, productive, and instructionally sound uses of digital, networked, and abundant information environments. 2. Provide safe digital environments for learners and to instill safe practices and habits among the learning community. This wiki site will serve as a launchpad to other documents and communities seeking to provide guidance in acceptable use policy development and also as an incubator for ideas related to issues, document structures, new problems and opportunities, and maintenance.
Keith Hamon

TED | Talks | Susan Blackmore: Memes and "temes" (video) - 0 views

  •  
    Blackmore studies memes: patterns that replicate themselves, which sounds very much like the whole process of education to me.
Angela Maiers

Soungle.com - 0 views

  •  
    Search engine for sounds?
Shaun Fletcher

The Ethics of Nanotechnology - 0 views

  •  
    Imagine a world in which cars can be assembled molecule-by-molecule, garbage can be disassembled and turned into beef steaks, and people can be operated on and healed by cell-sized robots. Sound like science fiction?
Anne Bubnic

Read The Words - 0 views

  •  
    ReadTheWords.com is a free, web based service that assists people with written material. We do this by using TTS Technology, or Text To Speech Technology. Users of our service can generate a clear sounding audio file from almost any written material. We generate a voice that reads the words out loud, that you request us to read.
Jason Heiser

Read The Words - 0 views

shared by Jason Heiser on 05 Aug 08 - Cached
  •  
    SImilar to hearwho.com can copy and paste text into the box (up to 80,000 characters) and have the text converted to sound for download
anonymous

Game Templates - 0 views

  •  
    different variations of interactive game templates with sound
« First ‹ Previous 61 - 80 of 152 Next › Last »
Showing 20 items per page