Skip to main content

Home/ elearning 2.0/ Group items matching "Attack" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Nigel Coutts

Sharing our Puzzles of Practice - The Learner's Way - 0 views

  •  
    Einstein is often quoted as having said "If I have an hour to solve a problem and my life depended on the solution, I would spend the first 55 minutes determining the proper question to ask, for once I know the proper question, I could solve the problem in less than five minutes." Clearly Einstein understood how to attack puzzling problems. As teachers we face a host of puzzles on a daily basis. Every student we teach, thanks to their idiosyncrasies presents a unique puzzle. The interactions between students further complicates things. Our goals for our learners, their learning needs, the demands of the curriculum, pressures from beyond the classroom all result in puzzles for us to manage and to solve.
nolanhout

Customer Training with Interactive Videos - 0 views

  •  
    Engaging video-based learning for IT-services company to help decrease the risk of cyber-attacks and data breaches
Nigel Coutts

Questions to ask as we ponder the latest PISA results - The Learner's Way - 0 views

  •  
    I am wanting to take a slightly different approach to this weeks post. The past week has seen the latest round of PISA results and the media has had a field day. Headlines have routinely attacked students, educators and education systems in equal measure. The Canberra Times reported that "Australian school scores plummet on world stage", the Sydney Morning Herald led with "Alarm bells': Australian students record worst result in global tests" and The Weekend Australian went with "PISA global educational rankings: Schools fail on maths, science". 
E-Cigs Zone

Tobacco Warning: Even Non-Smokers Are At Risk - 0 views

Visit http://www.ecigzone.tk Smoking or puffing a tobacco cigarette is a vice that literally enslaves millions of people around the world. It is amazing how a small roll of finely cut tobacco, enc...

health healthy addictive addiction electronic cigarette electric smoke smokeless lifestyle

started by E-Cigs Zone on 28 Jun 12 no follow-up yet
John Onwuegbu

Special Report: 2014 Cyberthreat Defense Report | Questechie - 1 views

  •  
    And as applicable to war scenario, knowing your enemy is also the key to an effective strategy for IT security.
Dianne Rees

» Resources - 1 views

  • This is a great utility for reading text back to you from any document or screen.  Great for students and also for those of us preparing texts.  A great way to check our work.
  • This is another animation package, a bit like Pivot. Only this one is entirely online, no programmes to install and has a more graphic quality to it. You build up your shape with basic building blocks and then animate. A simple and intuitive interface and when combined with CamStudio a real winner I think.
  • Spybot search and destroy is an extremely powerful malware attack program that allows you to surf the Internet with all the nasties blocked at the browser level.  A great bit of code that needs to be supported.
  • ...5 more annotations...
  • This is a great looking tool that allows you to add real creativity to your wiki, blog or website.  There is a little snippet of code that needs to be embedded  on your site and then the application runs.
  • This is a great tool for literacy.  It enables students to create their own story
  • This utility allows you to create your own widgets for your website, wiki, social networking site etc.  It allows you to create bespoke widgets, embed Flash or HTML code or simply use an RSS feed.
  • Zamzar:  This is a free online service that allows you to convert almost any file into another format that you wish.  Great for converting .flv video files into something that you can play on your computer or mp3 player.
  • Zoho: Zoho is a complete suite of online tools that are designed to increase your online functionality.  It is free to join and is well worth spending some time with the range of 18 applications for you to choose from to ascertain just how you could utilise these tools in your classroom.
vishwanath123

67 percent of the high number of security breaches reported than five years back. - 0 views

  •  
    Like always, even the last year wasn't any bad for hackers! They were busy targeting and attacking major cities, state and local governments, businesses, hospitals, and schools around the globe. They used all forms of cyberattacks, including ransomware, BEC, phishing, and many others, to get hold of their malicious intent.
‹ Previous 21 - 28 of 28
Showing 20 items per page