Skip to main content

Home/ educators/ Group items tagged hardware

Rss Feed Group items tagged

Vicki Davis

What are creative ways we can create symbiotic learning relationships between different... - 2 views

  •  
    This is a fascinating conversation about connecting, symbiotic relationships and more with some powerful, spot on answers. The teachers in our current Flat Classroom 12-1 cohort are amazing (and we have another cohort starting soon -- here's what we've been talking about this week. "This is happening now. Live Mocha and other sites have tandem learning - each learner teaches the other a different language. In my classroom, I have the older students teach younger students about computer hardware. But we could be doing so much more. Some professors like Dr. Leigh Zeitz (his students have served as expert advisors) and Dr. Eva Brown (her students helped run Eracism last year) are flattening their college classrooms with preservice teachers by having the teachers connect with high school and younger classrooms. These preservice teachers are understanding the nuances of the global collaborative classroom before graduating from college! There are so many ways we could be creating these types of learning relationships. This week, let's publicly talk about our ideas and also experiences in creating these experiences. We can learn more and do more in this area and technology opens up limitless possibilities. What do you think?"
carlos villalobos

PicoBoard - Scratch Wiki - 3 views

  •  
    "A PicoBoard is a piece of hardware that allows Scratch projects to interact with the outside world. Currently it works on Scratch 1.4 and 2.0."
Fred Delventhal

ubermix Home - 5 views

  •  
    The ubermix is an all-free, specially built, Linux-based operating system designed from the ground up with the needs of education in mind. Built by educators with an eye towards student and teacher empowerment, ubermix takes all the complexity out of student devices by making them as reliable and easy-to-use as a cell phone, without sacrificing the power and capabilities of a full operating system. With a turn-key, 5 minute installation, 20 second quick recovery mechanism, and more than 60 free applications pre-installed, ubermix turns whatever hardware you have into a powerful device for learning. via James T. Sanders
Vicki Davis

Google's forays beyond the search box - Tech News | The Star Online - 3 views

  •  
    Welcome to your new Google smarthome - not smartphone - smarthome. They've bought a smart thermostat maker - I can imagine all kinds of cool things with Google Glasses, Droids, and other Google integrations with this. This interesting article covers many of the things Google has gone into besides their traditional search box/ advertising model and it tells you about the future of our world as a major giant positions for the Internet of Things which moves far beyond our screens into the air we breathe. This will impact our schools beyond what we understand as our surroundings become smarter and able to be controlled remotely in ways we can't really understand today. These are trends I'll be discussing in my Intro to Computer Science classes. "Google Inc announced plans to acquire smart thermostat maker Nest Labs Inc for US$3.2bil (RM10.54bil), signalling the Internet company's intention to expand into a broader array of devices and bringing valuable hardware design expertise in-house. "
Nelly Cardinale

Guides, HowTos and Tips for Technology Geeks - The Geek Stuff - 0 views

  •  
    Howto and instruction guides on Linux, Database, Hardware, Security and more.. You can download a great free e-book called Linux 101 Hacks
Terry Elliott

What We Use: The Lifehacker Editors' Favorite Software and Hardware - 0 views

  •  
    Lots of practical
Patti Porto

Poll Everywhere | Simple Text Message (SMS) Voting and Polling, Audience Response Syste... - 0 views

  •  
    Poll Everywhere replaces expensive proprietary hardware-based response systems with standard web technology. It's the easiest way to gather live responses in any venue: conferences, presentations, classrooms, radio, tv, print - anywhere. Its simplicity and flexibility are earning rave reviews.
Dave Truss

The Digital Down Low: 1:1 Learning and the iPad...a few thoughts - 13 views

  •  
    Even though most students who already own a laptop own a mac, we know that others are using a range of models running everything... Because our primaryacademic learning platforms (moodle and google apps education edition) run directly through the browser we're able to take a hardware and OS nuetral approach in our 1-1 learning model. @mjmontagne calls this "being device and OS agnostic"
Martin Burrett

Airtame launches new product, @Airtame 2 - 1 views

  •  
    "In the past 4 years, Danish startup Airtame has marked itself as a frontrunner in the world of wireless HDMI. Now they're launching a new hardware product - Airtame 2."
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jeff Johnson

NASA Study Says Water Flowed Freely On Mars -- Mars -- InformationWeek - 0 views

  •  
    Scientists will use the information to determine where to look for signs of life on the Red Planet
Ruth Howard

High Scalability - High Scalability - The Amazing Collective Compute Power of... - 4 views

  • Earlier we talked about how a single botnet could harness more compute power than our largest super computers. Well, that's just the start of it. The amount of computer power available to the Ambient Cloud will be truly astounding.
  • By 2014 one estimate is there will be 2 billion PCs. That's a giant reservoir of power to exploit, especially considering these new boxes are stuffed with multiple powerful processors and gigabytes of memory. 7 Billion Smartphones By now it's common wisdom smartphones are the computing platform of the future. It's plausible to assume the total number of mobile phones in use will roughly equal the number of people on earth. That's 7 billion smartphones. Smartphones aren't just tiny little wannabe computers anymore either. They are real computers and are getting more capable all the time.
  • One Google exec estimates that in 12 years an iPod will be able to store all the video ever produced.
  • ...8 more annotations...
  • But all the compute power in the world is of little use if the cores can't talk to each other.
  • Inductive chargers will also make it easier to continually charge devices. Nokia is working on wireless charging. And devices will start harvesting energy from the surroundings. So it looks like the revolution will be fully powered.
  • . Literally billions of dollars are being invested into developing a giant sensor grids to manage power. Other grids will be set up for water, climate, pollution, terrorist attacks, traffic, and virtually everything else you can think to measure and control.
  • . Others predict the smart grid could be 1,000 times larger than the Internet.
  • Clearly this technology has obvious health and medical uses, and it may also figure into consumer and personal entertainment.
  • What if instead smartphones become the cloud?
  • In the future compute capacity will be everywhere. This is one of the amazing gifts of computer technology and also why virtualization has become such a hot datacenter trend.
  • It's out of that collective capacity that an Ambient Cloud can be formed, like a galaxy is formed from interstellar dust. We need to find a more systematic way of putting it to good use.
  •  
    digital citizenship headed for the clouds...
Vicki Davis

64 Things Every Geek Should Know - LaptopLogic.com - 1 views

  • Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing.
    • Vicki Davis
       
      Often the keylogger is a program on the computer, so don't think just looking for the hardware will find it!
  • Tor is an onion-routing system which makes it 'impossible' for someone to find out who you actually are.
  • See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
    • Vicki Davis
       
      FYI - as a person who has had to do this on a Windows computer - this often doesn't work!
  • ...3 more annotations...
  • Every geek should know how to recover the master book record.
    • Vicki Davis
       
      I did this last week! It saved me a TON of time!
  • There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
    • Vicki Davis
       
      There are inexpensive programs that you can use to do this - it helped us with a personnel matter quite a few years back - I think every IT person should have such a program and every teacher should understand that it is possible for such a program to be used. I teach my students that everything ever saved on a hard drive can be retrieved - be careful.
  • Person to Person data sharing
    • Vicki Davis
       
      Uhm - that is peer to peer!
  •  
    Great article with many things people should know.
  •  
    Cool article that covers a lot of things that people should know - whether you mind being called a geek or not. Very interesting reading.
Dean Mantz

Pogoplug, Your Personal Cloud: Free Software and Award-Winning Devices - 24 views

  •  
    Download & install software.  Start sharing music, videos, and photos with others. 
1 - 16 of 16
Showing 20 items per page