Skip to main content

Home/ educators/ Group items tagged antonio

Rss Feed Group items tagged

elizee smith

Limo San Antonio - 0 views

  •  
    Shark limousines are central Texas' largest and most trusted limousine and sedan service. We currently provide service in San Antonio, Austin, San Marcos, New Braunfels, Boerne and surrounding areas. Shark Limousines specializes in corporate travel, Airport Transportation San Antonio, charter services, anniversaries, bachelor/bachelorette parties, High School socials/Proms, concerts, wine tours, Holiday parties as well as sporting events. Our premier fleet consists of H2 super stretch Hummers, extreme party buses, Excursion limos, as well as luxury Town car limousines. Our corporate fleet includes charter buses, mini buses, stretch limousines, Escalades, executive S550 Mercedes and corporate Town cars.
  •  
    More spam, this is an education list
elizee smith

san antonio limousine - 2 views

  •  
    We putt all the options and choice to the customers to choose from them. specially the airport transportation San Antonio is best for saying luxury welcome or good bye to any of your lover. So dont waste your time and just need to visit us because customers satisfaction is must in our company policy. http://goo.gl/eCTE2
  •  
    Spammer!
Vicki Davis

globalcollaboration - Flat Classroom Workshop 2013 - 1 views

  •  
    If you're heading to ISTE and you're ready to collaborate globally, Julie Lindsay, Flat Classroom cofounder will be hosting a Flat Classroom workshop at the International School of San Diego on June 20-21 - here's the  information. "Julie Lindsay, co-founder and Director of Flat Classroom, award winning global collaborative projects, and Flat Classroom Conference and Live Events Inc. unique collaborative live events for teachers and students, announces the June 20 & 21, 2-day 'Flat Classroom Workshop - Seven Steps to Global Collaboration'. Educators who want to transform their learning and embrace global collaboration in their curriculum are invited to join Julie for a unique professional development experience at International School of the Americas in San Antonio, Texas."
Vicki Davis

Learning independence with Google Search features | Official Google Blog - 1 views

  •  
    Very proud of my dear friend Cheryl Oakes from Maine who is on the Official Google blog with her work with those with disabilities. Cheryl is an amazing woman who loves children. My youngest son has met her only once (in San Antonio at ISTE) and still calls her Aunt Cheryl. She has that effect on people. Great post. "One teacher who has taken advantage of the web as an educational tool is Cheryl Oakes, a resource room teacher in Wells, Maine. She's also been able to tailor the vast resources available on the web to each student's ability. This approach has proven invaluable for Cheryl's students, in particular 16-year-old Morgan, whose learning disability makes it daunting to sort through search results to find those webpages that she can comfortably read. Cheryl taught Morgan how to use the Search by Reading Level feature on Google Search, which enables Morgan to focus only on those results that are most understandable to her. To address the difficulty Morgan faces with typing, Cheryl introduced her to Voice Search, so Morgan can speak her queries into the computer. Morgan is succeeding in high school, and just registered to take her first college course this summer."
Vicki Davis

K12 Online Conference 2008 | K12Online08 Call for Proposals: Amplifying Possibilities - 0 views

  •  
    Time for K12 online conference proposals: "We are pleased to announce the call for proposals for the third annual "K12 Online Conference" for educators around the world interested in the use of web 2.0 tools in classrooms and professional practice. This year's conference is scheduled for October 20-24 and October 27-31 of 2008, and will include a pre-conference keynote during the week of October 13. The conference theme for 2008 is "Amplifying Possibilities." Participation in the conference (as in the past) is entirely free. Conference materials are published in English and available for worldwide distribution and use under a Creative Commons license. Some changes in the requirements for presentations are being made this year and are detailed below. The deadline for proposal submission is June 23, 2008. Selected presentations will be announced at NECC 2008 in San Antonio, Texas, USA on July 2.
  •  
    K12 online 2008 call for proposals.
cory plough

edubloggercon » Attending San Antonio 2008 - 0 views

  •  
    Attendee page
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Emily Vickery

independentschools » home - 0 views

  • NAIS will host an independent school birds-of-a-feather gathering at the 2008 NECC in San Antonio. The birds gathering will take place on Tuesday, July 1 from 4:45 to 5:45pm.
  •  
    ISTE has a wikispace for independent schools.
1 - 9 of 9
Showing 20 items per page