Skip to main content

Home/ educators/ Group items tagged web programs

Rss Feed Group items tagged

Anne Bubnic

Water Quality Service Learning Program - 0 views

  •  
    The California Water Boards Water Quality Service Learning Program Web site is designed to introduce teachers to an innovative student-centered science investigation focused on California's growing problem of polluted runoff. The resources are designed to be used with students enrolled in grades 4 through 6.
yc c

Google Code University - Google Code - 16 views

  •  
    This website provides tutorials and sample course content so CS students and educators can learn more about current computing technologies and paradigms. In particular, this content is Creative Commons licensed which makes it easy for CS educators to use in their own classes. The Courses section contains tutorials, lecture slides, and problem sets for a variety of topic areas: AJAX Programming Algorithms Distributed Systems Web Security Languages In the Tools 101 section, you will find a set of introductions to some common tools used in Computer Science such as version control systems and databases.
David Wetzel

Wiki or Blog: Which is Better? - 9 views

  •  
    Both wikis and blogs provide teachers with a a dynamic process for integrating Web 2.0 technology in their science and math classes. These two types of online tools offer students a more engaging process for learning. Both are relatively easy tools which do not require teachers or students to learn any special program tools or computer skills. Their uses and applications are only limited by the vision and purpose for helping students learn.
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
Dennis OConnor

UW-Stout ELearning and Online Teaching Certificate (Facebook Program Page) - 7 views

  •  
    Here's our new program page on Facebook.  I am updating this page regularly with information for anyone interested in e-learning and online teaching best practices.  You don't have to be a current or former student to take advantage of the information and connections found here.  I do ask you to 'Like' this page if you find it useful.   (Try it! You'll Like It!)
Vicki Davis

Alice.org - 0 views

  •  
    Alice 3.0 is being tested at Carnegie Mellon this semester with an expected release in a little less than a year. Full programming with 3D capabilities. This is a much awaited release and will integrate the characters from the Sims into Alice.
  •  
    Alice 3.0 to be a part of web 3d.
Maggie Verster

Lovely list of school resources, software, games and stuff! - 0 views

  •  
    You will find a growing list of programs that you can use for free on the web or you can download. Scroll through the list and try them out.
yc c

Wolfram Demonstrations Project - 0 views

  •  
    Offers interactive demonstrations of anything that can be modeled mathematically - bacteria growth, light refraction, supply and demand, etc. Running a demo requires Mathematica Player, which can be downloaded free, along with the demos
  •  
    About the Wolfram Demonstrations Project Conceived by Mathematica creator and scientist Stephen Wolfram as a way to bring computational exploration to the widest possible audience, the Wolfram Demonstrations Project is an open-code resource that uses dynamic computation to illuminate concepts in science, technology, mathematics, art, finance, and a remarkable range of other fields. Its daily-growing collection of interactive illustrations is created by Mathematica users from around the world, who participate by contributing innovative Demonstrations. Interactive computational resources have typically been scattered across the web--requiring specialized programming knowledge that's made them difficult and expensive to develop. As a result, their coverage has long been limited, and progress has been slow. In many ways, the Wolfram Demonstrations Project introduces a new paradigm for exploring ideas. The power to easily create interactive visualizations, once in the domain of computing experts alone, is now in the hands of every Mathematica user. Demonstrations can be created with just a few short lines of readable code, powered by the revolutionary advances in Mathematica. This opens the door for researchers, educators, students, and professionals at any level to create their own sophisticated mini-applications and publish them online.
Ted Sakshaug

StoryPlace - The Children's Digital Library - 1 views

  •  
    Children and their parents have for years enjoyed attending storytimes, checking out books and participating in a number of other educational, entertaining and participatory programs at the various locations of The Public Library of Charlotte Mecklenburg County. StoryPlace, an interactive web site, came about to provide children with the virtual experience of going to the library and participating in the same types of activities the library offers.
Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

FireShot - Take screenshots of web pages with Firefox extension! - 0 views

  •  
    Cool firefox extension for capturing screen shots.
  •  
    Cool cool cool firefox extension that creates and edits screenshots of web pages. Soo cool!
Vicki Davis

The Apple-Microsoft spat over App Store fees could shape the future of both Office and ... - 2 views

  •  
    In a huge turn of irony, at least if one considers how Bill Gates began his programming career, a spat over Office 365 coming to the ipad and Apple's desire to get 30% commissions for anyone signing up for the service if it originates on the ipad, may mean that office 365 won't come to the ipad at all. The evolution of the platform to tablet devices is critical to software companies and yet, many balk at the steep cut some like Apple take. It is interesting to watch, but there is a bigger issue here. Microsoft continues to have the best Office suite, but, as with Google Drive, many move because of a lack of ubiquity and collaborative ability driven by the walls erected by Microsoft in their traditional, but understandable proprietary system. I have to think that there are bigger issues at stake for Microsoft here. These are interesting times, to say the least, as I sit here watching Batman on my Apple TV streaming via the wifi and read this article on my ipad as I blog in the den using a bluetooth logitech keyboard.
Vicki Davis

Diigo Blog » Wear your "Diigo Education Pioneer" Badge with pride :-) - 0 views

  •  
    New Diigo Pioneer badge
  •  
    If you want more "bling" for your blog -- Diigo has a new program to recognize educational pioneers using Diigo. Since the beginning, Maggie Tsai has listened to educators (not just me) in amazing ways and this is great. If you have a classroom diigo group, then log into your teacher console and snag your "diigo educational pioneer" badge - I'm going to get mine!! We use diigo groups for all of my classes and we have tag dictionaries based upon the major topics we cover.
Vicki Davis

Estie's Gifts & Treasures: Thing #23 - Reflections - 1 views

  •  
    This is precisely why more of us should be implementing the "23 things" pd program with our teachers. Estie Cuellar from Houston Texas did an amazing job discussing her learning journey and did an amazing job blogging it as well. This is very impressive and displays the transformational nature of becoming immersed in these tools. I look forward to seeing what happens in her classroom! Again, I believe that embedded PD (professional development that is in pieces as part of our day) rather than binge PD is much more transformational! This is proof!
  •  
    summary of Estie Cullear's learning from the 23 things project -- an excellent professional development method for EMBEDDING PD.
Christine Sherk

Student Aid on the Web - 0 views

  •  
    Grant Program that provides grants of up to $4,000 per year to students who intend to teach in a public or private elementary or secondary school that serves students from low-income families.
小石 -

Scratch | Home | imagine, program, share - 0 views

  • There are 502,574 projects with a total of 12,554,294 scripts and 3,921,884 sprites created by 75,665 contributors of our 333,865 registered members. That's a lot of Scratch-ing!
Dave Truss

Students Live - Connecting Students to the 2010 Winter Games - 12 views

  •  
    Students LIVE! is a program that invites twenty-four students from across Metro Vancouver and the Sea-to-Sky region to attend sport and cultural events during the Vancouver 2010 Olympic and Paralympic Winter Games and then share their experiences through social media tools. Twelve students will be selected for the Olympic Games and 12 will be selected for the Paralympic Games.
Roland O'Daniel

5 Trends in Education Technology Leadership -- THE Journal - 11 views

  •  
    5 Trends in Education Technology Leadership SETDA's "National Educational Technology Trends Report" spotlights state efforts to boost learning through the federal Enhancing Education Through Technology program. By David Nagel04/23/10
‹ Previous 21 - 40 of 59 Next ›
Showing 20 items per page