Skip to main content

Home/ educators/ Group items tagged e-mail

Rss Feed Group items tagged

Martin Burrett

EdTech Lunch with @ICTMagic highlights way to get rid of needless school e-mails - 0 views

  •  
    "In the first of a series of 5 webinars, Martin Burrett (@ICTMagic) showcased innovative ways that school leaders and teachers can eliminate the bulk of e-mails out of their school lives. Using online, collaborative communication tools, teachers and school leaders can easily send messages to each other, with fantastic tools that allow users to 'turn off notifications', or turning on 'snooze mode'. Such features help in that messages only arrive when the user specifies, therefore eliminating the need to deal with e-mails when they arrive at a time when individuals should be resting."
Ted Sakshaug

Introduction - 21 views

  •  
    Your job will be to investigate e-mails or scenarios online that have been circulated or seen by thousands of people. After doing research, you will determine if those sites or e-mails are truthful or if they are a hoax. Once you have completed this webquest, you will be more critical of information on the Internet and your research skills will be more advanced.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
yc c

Eyejot - the easiest way to send video - 12 views

  •  
    service iframe your video on top of a webpage - eg: to comment a webpage\n\nBenefits of Sending Branded Video E-mails:\nProfessional Looking: once you've subscribed and saved the Eyejot This! Bookmarklet onto your toolbar, shooting and sending a branded video email is easy. In fact, the whole process takes less than a few minutes (depending on the length of your message of course).Easier to Create than Written E-mail: In most cases, recorded a video email is easier than typing out a full on email. Why? Because on video, you're conversational and spoken word comes out more naturally. It's a great way to get face-to-face with clients (at least virtually) and works well with both existing clients and clients that you're trying to court.Great Way to Capture Attention and Have Site Visitors Spend More Time On-Site: my favorite part about Eyejot is the ability to share a webpage with someone while branding it with your email message. It's a great way of sharing relevant information with a personalized touch. Sharing a particular blog post, listing or teaching someone how to navigate/use the IDX on your blogsite increases the chances of someone spending more time on your site.
Peggy George

Keeping your e-mail from being inudated - 154 views

Thanks, Christy. I'm still having problems with the RSS feed. I'm using NetNewsWire on my Mac. I tried it on two different computers and on the first one when I clicked on the RSS icon it opened NN...

efficiency

Vicki Davis

Where are the savings in using GoogleApps? - Home - Doug Johnson's Blue Skunk... - 12 views

  • These are rough and admittedly optimistic estimates, but I think you can see the general trend. Even if only 50% of my estimated nearly $2M in savings is realized, that averages out to close to $200,000 per year. (Out of a $1.2M budget.) I am not suggesting reducing tech budgets by this amount, but I can sure think of a lot more interesting things (like kids' computers, a more robust wireless network, and more bandwidth) to spend tech dollars on. Yes, I need to pay $7 a year per administrative, possibily teacher, e-mail account for archiving and retrieval. Not bad, though, considering.
  •  
    Doug Johnson estimates the savings moving to Google apps, Great post for those considering this. Doug says: "These are rough and admittedly optimistic estimates, but I think you can see the general trend. Even if only 50% of my estimated nearly $2M in savings is realized, that averages out to close to $200,000 per year. (Out of a $1.2M budget.) I am not suggesting reducing tech budgets by this amount, but I can sure think of a lot more interesting things (like kids' computers, a more robust wireless network, and more bandwidth) to spend tech dollars on. Yes, I need to pay $7 a year per administrative, possibily teacher, e-mail account for archiving and retrieval. Not bad, though, considering."
Vicki Davis

NeoPets Parental Consent form - 0 views

  •  
    COPPA is a reason that many schools shy away from having any children under 13 participate in online sites, however, NeoPets is a website that has done this. This is a copy of their COPPA consent form. In here, you can see how they've tracked and worked with this permission. It does require the parents to fill out and fax or mail the form in to NeoPets to allow children to use the communications portion of the website. This would be a website to review if you're looking at creating a portal or service that allows kids under 13 to post and communicate in ways that tracks their data. I am wondering if Facebook would eventually do something like this or if they will continue to create an environment that encourages children to lie to get on their platform. (i.e. under 13 not allowed)
Ben Rimes

Prizmo for iPhone, iPod touch, and iPad - 15 views

  •  
    Optical character recognition (OCR) software for the Apple iDevices that will scan any text, and then output it to text for e-mail, documents, or spreadsheets. Also includes text reading, which would make it very valuable for both students with visual disabilities and reading/decoding problems.
Vicki Davis

Mr Rowland's Physical Education Posterous! - I wouldn't say I was the best teacher in t... - 0 views

  •  
    Example of a teacher posterous blog - instead of teaching them how to blog, just let them use their email!
  •  
    Doug Belshaw is encouraging his teachers to use posterous to communicate to students and parents. Literally, they send an e-mail to posterous and it creates a blog automatically for them. This is an example of a PE teacher. Now this is cool. DON'T teach teachers how to blog - use something they already know, email and just have them email it instead. Now how is that for a great idea!
Anne Bubnic

Will textbooks go the way of typewriters? - 0 views

  •  
    For anyone who attended college before the era of e-mails and the Internet, the notion that bulky textbooks could someday become obsolete might seem ludicrous. Yet with a wealth of information on virtually any topic now readily accessible online, more people are starting to ponder if these hefty staples of education will remain relevant.
anonymous

U Tech Tips » Blog Archive » Where are the comments? - 0 views

  •  
    The conversation that has been going on around Twitter both here and here has lead to other e-mails and discussions around building networks and specifically how do you get people to comment on your blog? The problem is….you can't make people comment. What you can do is write compelling blog posts that make people want to leave comments. How do you do that….I'm not sure.
Vicki Davis

17 Principles of Building Good Relationships With Bloggers - 0 views

  •  
    Great article about how to build good relationships with bloggers. I wish the countless people I've never heard of who e-mail me to write about their product would read this one. It is about building relationships!
  •  
    How to build relationships with bloggers.
Vicki Davis

Maine's Swedish Colony, July 23, 1870 - Welcome - Valkommen - 0 views

  •  
    Amazing student project to create memories and artifacts. This is an excellent partnership between the New Sweden Historical Society, Stockholm Historical Society, Maine Swedish Colony, Nylander Museum, New Sweden School, and others. It is time for museums and schools to begin partnerships in this way. What meaningful, authentic work. Wow! From Earnie Easter via e-mail today.
  •  
    Student projects from Earnie Easter's class sharing information about their community.
Doug Noon

ReadWriteThink: Lesson Plan: Audience, Purpose, and Language Use in Electronic Messages - 0 views

  •  
    With the increasing popularity of e-mail and online instant messaging among today's teens, a recognizable change has occurred in the language that students use in their writing. This lesson explores the language of electronic messages and how it affects other writing.
Ted Sakshaug

bubbl.us - free web application for brainstorming online - 8 views

  •  
    a free web application which offers the ability to create a colorful map for writers who like to color code the creative thoughts and processes. This tool also provides the ability to embed in an e-mail to send to publishers or other writers who may be collaborating on the project.
David Wetzel

10 Ways to Survive a Nightmare Online Learning Course - 14 views

  •  
    Ten ways to survive a nightmare course provides strategies for dealing with a difficult online learning situation. Problems may develop with any online course, due to causes beyond your control. Some problems include incompatible technology, continual course learning management system (LMS) problems, e-mail problems, or bewildering directions and assignments. Regardless the situation, there are many things you can do to overcome this less than happy experience and turn it a positive outcome.
Claude Almansi

CEC | Ask Arne: A Conversation with the Council for Exceptional Children's (CEC) Member... - 0 views

  •  
    "As I have travelled across the country visiting schools and classrooms and talking with teachers and parents, I have heard many questions about our plans at the U.S. Department of Education to support children with disabilities, their families, and the teachers who educate them and fight for them daily. To hear more about the issues affecting students with disabilities and their teachers, I asked CEC to contact members through an e-mail blast. Your response was overwhelming. Though CEC received more questions than we could possibly answer here, I have worked with your leadership to identify some of the central questions for educators of children with disabilities, and I have worked with my staff at the Department so that we can address them in this document. I would like to thank CEC members and all teachers of children with disabilities for their outstanding compassion and commitment and for the range of complex skills and talents you bring to teaching your students every day."
Claude Almansi

Bisharat! (EN) - 1 views

  •  
    "Welcome to the website of Bisharat! A language, technology, and development initiative. Bisharat* is an evolving idea based on the importance of maternal languages in sustainable development and the enormous potential of new information and communication technologies (ICTs) to benefit efforts in the area of language and development. Anticipating the gradual introduction of computers and the internet to rural communities in Africa, the current focus of Bisharat is on research, advocacy, and networking relating to use of African languages in software and web content. This website is always in development... Your comments and suggestions are welcome. To contact Bisharat, e-mail to: bisharat @ bisharat . net"
Susan Sedro

Teaching with Classroom Response Systems... - 0 views

  •  
    Derek Bruff, assistant director of Vanderbilt University's Center for Teaching, has written a book that reviews the uses of clickers and offers advice for institutions and professors. The book -- Teaching With Classroom Response Systems: Creating Active Learning Environments -- is just out from Jossey-Bass. Bruff responded to e-mail questions about the themes of the book.
Maggie Verster

Get e-mail (Gmail) My tutorial for novice teachers - 0 views

  •  
    My tutorial on why and how to set up and use Gmail. Download the powerpoint presentation from
1 - 20 of 35 Next ›
Showing 20 items per page