Skip to main content

Home/ elearning 2.0/ Group items tagged INCIDENT

Rss Feed Group items tagged

Martin Burrett

Pora Ora : The Online 3D Educational Game for Children - 0 views

  •  
    This is a MUST TRY site. It's not often that I'm amazed be an educational resource, but I am with this one. Pora Ora is a stunning educational virtual world for Primary school aged students. Play truely fun educational games which practise skills in English, maths and many other subjects. The graphics and useably is superb. Online safety is at the heart of this site. The parential admin account can set the student's account to free chat with everyone to completely locked down where they have the world to themselves and everything in between. The site has a language filter and users can report any incidents of trouble. Also, the first task requires the user to complete an online safety task. The site is free with a few premium features coming out later. You have got to try this one! http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Graham Atttwell

XWiki - Cases - WebHome - 0 views

  •  
    Digital identities Case Studies describe critical incidents of practice, highlighting key design challenges and possible solutions.
Dena Budrecki

Text Unto Others... As You Would Have Them Text Unto You -- THE Journal - 0 views

  • acebook, so it's imperative that schools teach students how to use these sites without putting themselves at risk.
    • Dena Budrecki
       
      This is hard when most district block these sites!
  • "9 Steps to Building a Good Digital Citizen").
  • "Goofus and Galant" cartoon from Highlights magazine
    • Dena Budrecki
       
      I had to look this up.
    • Dena Budrecki
  • ...2 more annotations...
  • Cybernites
    • Dena Budrecki
       
      Educating parents is essential
  • The district works regularly with faculty members to explain its acceptable use policy and help them understand how to apply the policy in their classrooms. These lessons have a trickledown effect; when a student violates the AUP for the first time, teachers use the experience as a teachable moment, dissecting the incident and reflecting back on where the student erred.
Antwak Short videos

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
1 - 4 of 4
Showing 20 items per page