Skip to main content

Home/ educators/ Group items tagged accounting

Rss Feed Group items tagged

C CC

Formative - 9 views

  •  
    A superb assessment resource which allows you to gain real-time feed back through tests, quizzes and even allowing students to annotate a document that you upload. Set up your quiz/test using true/false statements, longer text answers or students can draw the answer. You can setup a marking key meaning that the site will mark the answers for you and give instant data on who is correct. Your student can either have there own free account or they can access the material using a link. The site works across a wide range of devices.
  •  
    A superb assessment resource which allows you to gain real-time feed back through tests, quizzes and even allowing students to annotate a document that you upload. Set up your quiz/test using true/false statements, longer text answers or students can draw the answer. You can setup a marking key meaning that the site will mark the answers for you and give instant data on who is correct. Your student can either have there own free account or they can access the material using a link. The site works across a wide range of devices.
Jeff Johnson

Technology | Change.gov: The Obama-Biden Transition Team - 0 views

  •  
    "Let us be the generation that reshapes our economy to compete in the digital age. Let's set high standards for our schools and give them the resources they need to succeed. Let's recruit a new army of teachers, and give them better pay and more support in exchange for more accountability. Let's make college more affordable, and let's invest in scientific research, and let's lay down broadband lines through the heart of inner cities and rural towns all across America."
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Twitter / sljournal - 0 views

  •  
    The usefulness of twitter -- this is THE twitter accounts that librarians should follow!
  •  
    The twitter account for librarians.
Vicki Davis

Why Users Don't Read Documentation | Idiotprogrammer - 0 views

  • Users don’t know the terminology to describe the problem they have or to know what to look for. Users haven’t studied the problem long enough. Users don’t recognize details or signs which might aid in understanding the problem. Users might not have easy access to the documentation, may not be qualified to understand it (because of language barriers or technical level), or they may simply not have the time or energy to use it. Users might be unaware of the status of their computer/account/browser and/or they might be limited in their ability to obtain this information. Users might have received incorrect or misleading information from someone else, or they might have made incorrect assumptions about the product. Users may be familiar with one kind of product and lack the appropriate mental model for knowing how the product is supposed to work. Users might have previous problems in the past and found it easier just to call technical support than to risk aggravating the problem when trying to fix it.
  •  
    I love this article which talks about the most common problems when people call customer service. I believe that as I teach my students I should help them become technically fluent to minimize these problems and maximize their potential in this increasingly technical world. The most common problems are: * Users don't know the terminology to describe the problem they have or to know what to look for. * Users haven't studied the problem long enough. * Users don't recognize details or signs which might aid in understanding the problem. * Users might not have easy access to the documentation, may not be qualified to understand it (because of language barriers or technical level), or they may simply not have the time or energy to use it. * Users might be unaware of the status of their computer/account/browser and/or they might be limited in their ability to obtain this information. * Users might have received incorrect or misleading information from someone else, or they might have made incorrect assumptions about the product. * Users may be familiar with one kind of product and lack the appropriate mental model for knowing how the product is supposed to work. * Users might have previous problems in the past and found it easier just to call technical support than to risk aggravating the problem when trying to fix it.
  •  
    Information on how to help users become more proficient at being helped.
Vicki Davis

Twitter / necc2008 - 0 views

  •  
    Follow this twitter account to keep up w/ NECC.
  •  
    The NECC twitter account
Vicki Davis

Where are the savings in using GoogleApps? - Home - Doug Johnson's Blue Skunk... - 12 views

  • These are rough and admittedly optimistic estimates, but I think you can see the general trend. Even if only 50% of my estimated nearly $2M in savings is realized, that averages out to close to $200,000 per year. (Out of a $1.2M budget.) I am not suggesting reducing tech budgets by this amount, but I can sure think of a lot more interesting things (like kids' computers, a more robust wireless network, and more bandwidth) to spend tech dollars on. Yes, I need to pay $7 a year per administrative, possibily teacher, e-mail account for archiving and retrieval. Not bad, though, considering.
  •  
    Doug Johnson estimates the savings moving to Google apps, Great post for those considering this. Doug says: "These are rough and admittedly optimistic estimates, but I think you can see the general trend. Even if only 50% of my estimated nearly $2M in savings is realized, that averages out to close to $200,000 per year. (Out of a $1.2M budget.) I am not suggesting reducing tech budgets by this amount, but I can sure think of a lot more interesting things (like kids' computers, a more robust wireless network, and more bandwidth) to spend tech dollars on. Yes, I need to pay $7 a year per administrative, possibily teacher, e-mail account for archiving and retrieval. Not bad, though, considering."
Vicki Davis

UK Team is focusing on online comment defamation - 1 views

  • a new team to track down people who make anonymous comments about companies online.
  • a new team to track down people who make anonymous comments about companies online.
  • a new team to track down people who make anonymous comments about companies online.
  • ...15 more annotations...
  • a rising problem with people making anonymous statements that defamed companies, and people sharing confidential information online.
  • the new team would ensure there was “nowhere to hide in cyberspace”.
  • a story from six years earlier about United Airlines going bankrupt was voted up on a newspaper website. This was later picked up by Google News and eventually the Bloomberg news wire, which published it automatically as if it were a news story.
    • Vicki Davis
       
      Could this be considered the new "insider trading" - hmmm. Surely there are issues if it is done maliciously but isn't there a line here?
  • rogue employees
    • Vicki Davis
       
      Uhm, how about rogue companies?
  • trying to get Internet Service Providers to give out details of customers who had made comments online
  • shares in American firm United Airlines fell by 99 per cent in just 15 minutes after an outdated story that the firm had filed for bankruptcy was forced back onto the headlines.
  • the numbers of disgruntled employees looking to get their own back on employers or former employers was also on the rise.
  • could stifle free speech, and the ability of people to act as whistle-blowers to expose actions by their employers.
  • an outlet for anonymous reporting.
    • Vicki Davis
       
      Is it possible to have accountability AND anonymity? Must these be mutually exclusive?
  • This is known as the ‘Streisand effect’ online, after a case where singer Barbara Streisand tried to suppress photos of her California beachside home from a publicly-available archive of photos taken to document coastal erosion.
  • Nightjack. This was the guy who was blogging on the front line about police work and he was forced to stop this story because he was unmasked by The Times
  • If you allow a lot of anonymous debate by people who are not regulated, you can get it descending to the common denominator. If you allow people to register with an identity, even if it’s not their real one, you bring the level of debate up.”
  • There was one case a couple of years ago that we just keep referring back to where a defamatory comment was made and it wasn’t taken down for a period of time. Because of that the host of the website was held to be liable.”
  • the ‘Wild West’ era of the internet was in some ways coming to an end, with firms starting to crack down
  • I think companies are still grappling with whether it’s better to take it on the chin and hope people don’t see the comments, or on the other hand cracking down on everything that’s particularly damaging that’s said online. Maybe this is set to change.”
  •  
    While this article starts out about a lawfirm in Birmingham UK that is going to "track down people who make anonymous comments about companies online" it becomes an amazingly poignant article on the very nature of the Internet today and the push pull between anonymous commenting and accountability of the commenter. Push pull between free speech and online identity and brand protection. One person in this article claims that this sort of thing is the sign that the "wild west" of the INternet is coming to an end. Oh dear, I hope someone invents a new one if somehow anonymous commenters are now going to risk such! Also love the article's discussion of the Streisand effect wherein Barbara protested the sharing of some photos of her eroding beachfront which caused a stir and more people looking at the photos than if she had left it alone. This article is going to be a must read for Flat Classroom students and would be great for college-level discussions as well.
Vicki Davis

Hands On With Twitter's New Photo Filters - 4 views

  •  
    Twitter has new photo filters powered by Aviary (an incredible tool that you can add for free, the last time I checked, to your school's Google apps for education account) it is easy to use. This article from mashable covers the changes but wonders if it is enough to pull people away from Instagram, who pulled the "twitter cards' feature earlier this week as more social media organizations try to claim "mine mine" over their users and don't want to share. Meanwhile, those who benefit, tend to be those who share the most.
Martin Burrett

RealtimeBoard - 18 views

  •  
    This is an amazing collaborative whiteboard where multiple users can edit a multimedia board in real time. The site allows you to signup and sign in using a Google account and you can access and add your files and media on your Google Docs/Drive area making this a fabulous companion to schools using Google Apps for education. You can write by typing or you can write in 'freehand' so you can use your interactive whiteboard to write and archive the lesson to use or refer to later. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

Sharing and Losing Control of an Online Persona - ProfHacker - The Chronicle of Higher ... - 9 views

  •  
    This story about a social media persona gone wrong is an excellent case study for educators. Personally, when I do fiction on Twitter (as in the case of a fictitious dialog between a student and teacher - I always start by disclosing it.) Secondly, I don't think it is smart to mess with people by making things up. People need to be able to trust you -- especially if you want to be a credible academic source. That said, read this so that when you see parody or fake accounts that you know they exist and you can also know that some people making things up for the fun of it.
Martin Burrett

Skoolbo - 17 views

  •  
    This is a must try site which provides an amazing 3D world which teaches English and maths core skills. Players race against two other randomly chosen online players of a similar level. The questions start out very easy and adapt to the performance of the player. The questions are read out and some are displayed on the screen. The player just clicks on the correct multiple choice answer to increase their speed. There is a download for PCs and Macs as well as apps for iPad and Android. There are teacher accounts which allow you to make logins for lots of children quickly. When there log in students will be asked to design an avatar. Because the resource requires a sizeable download it takes a little time to set up, but because it runs on your local device game play is very smooth and quick. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

The real problem in education: the 'opportunity gap' - 4 views

  •  
    "But even by reasonable standards, the nation's educational outcomes are not in much better shape than they were in 1983. Whether we're looking at overall scores or at achievement gaps, the trend lines for NAEP, the so-called Nation's Report Card, generally show a post-reform picture that looks pretty much like the pre-reform picture - with positive trend lines but apparent slowing after 1990. There is no way to tease those data into showing that test-based accountability reform is accomplishing its key learning goals."
Vicki Davis

Kindle Education - 3 views

  •  
    Some rules have changed as I've been reading up on having Kindles at schools. (Back in February I read a spate of posts mentioning that Amazon said that having 6 kindles share one account was just for "personal use" and that libraries can't do it.) But Amazon does have information on Whispercast which lets you handle distributing books. It is a "free self-service online tool" and I'm thinking that it is something we need to be using. It looks like you can also distribute many of the free ebooks onto Kindles. 
Vicki Davis

Chemicals found in phones are a no-no for kids - Cincinnati Business Courier - 1 views

  •  
    I saw this on Fran Drescher's Twitter account from the Cincinnati Business courier and am quite floored by it. Am I the only one who doesn't know this? How about all of the little kids I see where parents are handing them their ipad and smart phones for play purposes. I jusst need to know more but it is based on a study presented at the Pediatric Academic societies meeting in DC. Of course, they recommend hand washing. But pregnant women should be careful - a 10x increase in maternal PBDE's is associated with a 4 point IQ deficit. Of course, we also have the age old question here of causation or correlation.  I do think we need to know more and also if the equipment we're purchasing to use with young children has PBDEs in them.  If you know more, please leave comments. It does say that some manufacturers are voluntarily phasing these out. "Small children should not touch electronic items such as TVs, mobile phones, computers and other products, according to University of Cincinnati researchers. Chemicals found in such items and in many other products, including older carpets and furniture, can cause behavioral and cognition problems, they have found."
Martin Burrett

A focus on wellbeing by @Exe_Head - 1 views

  •  
    We are a happy and stable staff, and my colleagues are a fabulous group of people who look after each other and genuinely care about one another. We have an experienced leadership team, and always aim to take account of how people are feeling and the pressure they are under when trying  new approaches and changes to practice. Even so, it has become more and more clear that workload is becoming untenable and wellbeing is suffering a result. I feel that we have felt obligated at times to put policies in place that seem to be there to collect evidence for Ofsted rather than solely to improve the learning of the children in our care. We want to change this.
Martin Burrett

School Email: 9 Top Tips for Teachers & Students by @musictheoryguy - 0 views

  •  
    "Staff and students are expected to be fully conversant with school email. Not only do users need to check their email regularly enough so that they don't miss important announcements but they also have to understand and apply the complex landscape of netiquette, respond to emails quickly (and politely) and action any instructions that they receive. Being on top of your email inbox has never been so important in schools. So why, whenever I help a member of staff or a student, do they have an email account that is bursting at the seams with often more than 1000 emails in their inbox? It seems that how email is managed in schools is, well, often not managed well."
Martin Burrett

Letter Bubbles : The Typing Game! - 12 views

  •  
    This is a fabulous, fun typing game where users must pop bubbles by typing the letters. Steady typing scores more points and earn power-ups for typing well. You can make a free account to save your progress or just play. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

Tinkatolli - 8 views

  •  
    This is a fun, cute, social 3D island world designed especially with children in mind. Children make an avatar and follow a quick tutorial and explanation of safety rules. The children can take their characters on quests, play educational games and interact with other users of the site. A fabulous feature of the site is that users are encouraged to 'make and do' offline as well. These activities can be uploaded to a scrapbook and multimedia blog. Offline activities also generate points in the game. The scrapbook is defaulted to private and no photos of children will be approved by moderators if the scrapbook is public. All the usual safety features are in place, including a 'report' and 'block' other users button. The basic account with most features is free, but there are optional 'paid for' extras. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
‹ Previous 21 - 40 of 169 Next › Last »
Showing 20 items per page