Skip to main content

Home/ Flat Classroom Project/ Group items tagged e-mail

Rss Feed Group items tagged

brooke s

What is cyberspace? - A Word Definition From the Webopedia Computer Dictionary - 0 views

  •  
    "cyberspace (1) A metaphor for describing the non-physical terrain created by computer systems. Online systems, for example, create a cyberspace within which people can communicate with one another (via e-mail), do research, or simply window shop. Like physical space, cyberspace contains objects (files, mail messages, graphics, etc.) and different modes of transportation and delivery. Unlike real space, though, exploring cyberspace does not require any physical movement other than pressing keys on a keyboard or moving a mouse. "
Julie Lindsay

7 Things You Should Know About Alternate Reality Games | EDUCAUSE CONNECT - 0 views

  •  
    Alternate reality games (ARGs) weave together real-world artifacts with clues and puzzles hidden virtually any place, such as websites, libraries, museums, stores, signs, recorded telephone messages, movies, television programs, or printed materials. ARGs are not computer or video games, but electronic devices are frequently used to access clues. Players can meet and talk with characters in the narrative and use resources like postal mail, e-mail, the web, or the public library to find hints, clues, and various pieces of the puzzle. ARGs open doors into the future of students' professional lives, where they will be expected to solve complex problems by taking necessary raw materials from multiple resources, thinking critically and analytically, and putting their individual skills, interests, and abilities at the disposal of a group dedicated to a common goal.
Thomas H

Mobile phone - Wikipedia, the free encyclopedia - 1 views

  • A mobile phone (also called mobile, cellular phone, cell phone or handphone)[1] is an electronic device used for full duplex two-way radio telecommunications over a cellular network of base stations known as cell sites. Mobile phones differ from cordless telephones, which only offer telephone service within limited range through a single base station attached to a fixed land line, for example within a home or an office.
  • In addition to being a telephone, modern mobile phones also support many additional services, and accessories, such as SMS (or text) messages, e-mail, Internet access, gaming, Bluetooth and infrared short range wireless communication, camera, MMS messaging, MP3 player, radio and GPS. Low-end mobile phones are often referred to as feature phones, whereas high-end mobile phones that offer more advanced computing ability are referred to as smartphones.
  • A mobile phone (also called mobile, cellular telephone, or cell phone) is an electronic device used to make mobile telephone calls across a wide geographic area. Mobile phones are different from cordless telephones, which only offer telephone service within a limited range of a fixed land line, for example within a home or an office
  •  
    "A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile network operator. The calls are to and from the public telephone network which includes other mobiles and fixed-line phones across the world. By contrast, a cordless telephone is used only within the short range of a single, private base station. In addition to telephony, modern mobile phones also support a wide variety of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these more general computing capabilities are referred to as smartphones. The first hand-held mobile phone was demonstrated by Dr Martin Cooper of Motorola in 1973, using a handset weighing 2 1/2 lbs (about 1 kg).[1] In 1983, the DynaTAC 8000x was the first to be commercially available. In the twenty years from 1990 to 2010, worldwide mobile phone subscriptions grew from 12.4 million to over 4.6 billion, penetrating the developing economies and reaching the bottom of the economic pyramid"
scott summerlin

Google - Wikipedia, the free encyclopedia - 1 views

  • Google Inc. (NASDAQ: GOOG, FWB: GGQ1) is a multinational public cloud computing, Internet search, and advertising technologies corporation
  • Google runs over one million servers in data centers around the world,[13] and processes over one billion search requests[14] and twenty petabytes of user-generated data every day.
  • Google runs over one million servers in data centers around the world,[14] and processes over one billion search requests[15] and twenty petabytes of user-generated data every day.[16][17][18] Google's rapid growth since its incorporation has triggered a chain of products, acquisitions and partnerships beyond the company's core search engine. The company offers online productivity software, such as its Gmail e-mail software, and social networking tools, including Orkut and, more recently, Google Buzz.
  •  
    "Google Inc. (NASDAQ: GOOG, FWB: GGQ1) is a multinational public cloud computing, Internet search, and advertising technologies corporation. Google hosts and develops a number of Internet-based services and products,[5] and generates profit primarily from advertising through its AdWords program"
  •  
    Description of Google.
clayton lamar

Virtual visitation - Wikipedia, the free encyclopedia - 0 views

  • Virtual visitation is the use of electronic communication tools to provide contact between a parent and his or her children as part of a parenting plan or custody order. Virtual visitation includes many forms of communication, such as e-mail, instant messaging, and videoconferencing. Contents [hide]
Veronica Rohach

Is Google taking over the world wide web? - 0 views

  •  
    This article from the Daily Nation goes over the fact that Google is becoming increasingly large. Google now offers a service that competes with Skype's long distance calling. The apps that Google has makes it more necessary than just an E-mail. Google maps has also made it very hard for other companies to compete with Google.
mitch g

What is VPN? - A Word Definition From the Webopedia Computer Dictionary - 0 views

  • Home > VPN VPN (pronounced as separate letters) Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
  •  
    Home > VPN VPN(pronounced as separate letters) Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
Megan Gillespie

The doctor, the patient and the world-wide web: how the internet is changing healthcare - 0 views

  •  
    Health Services Research Unit, Department of Public Health & Policy, London School of Hygiene & Tropical Medicine, Keppel Street, London WC1E 7HT, UK 1Public Health & Clinical Quality Directorate, Department of Health, Richmond House, Whitehall, London SW1A 2NS, UK 2National electronic Library for Health, Institute of Health Sciences, University of Oxford, Old Road, Headington, Oxford OX3 7LF, UK Correspondence to: Dr John Powell E-mail: john.powell{at}lshtm.ac.uk To understand individual use of the internet and its impact on individuals, communities and societies is a challenge that is only beginning to be addressed.
Kristin K

E-Mails and Lies - NYTimes.com - 0 views

  •  
    Tells about how people are more likely to lie with email than with talking or writing. 
BAILEY P

IL Toolkit - Virtual Communications: Introduction - 0 views

  • Definition of Virtual Communications Virtual communications encompasses a broad spectrum of concepts, technologies and practices that are central to our daily lives. In our society today, we can now communicate with a friend or co-worker in another country or continent instantaneously. We can earn a college degree or take continuous learning classes online with the click of a few buttons. The proliferation of information and communication tools, like e-mail, instant messaging and Internet telephony has revolutionized the way we work and live. How we use the technologies, such as email and collaboration tools, can influence the quality of the work we do and can determine our ability to function as a high producing, high performing workforce. Virtual communications facilitates the ability to know and understand how to access and share information electronically and is a portal through which a world of limitless learning opportunities exist.
Vicki Davis

Making All the Right Calls | Popular Science - 1 views

  • “Imagine you’re out in the middle of nowhere and you want to be able to diagnose malaria,” says Daniel Fletcher, holding up what looks like a cellphone sprouting a kaleidoscope. All you have to do is aim the phone at a patient’s wan-looking skin or a drop of blood squeezed onto a microscope slide, he explains. Then you point, click, and hit “send.” The digital image zips to an off-site lab, where a technician scans it for signs of disease and e-mails back an initial diagnosis—all in less than 10 minutes. “In developing countries, patients wouldn’t have to go to a clinic,” he says. “You could make a diagnosis right in the field.” Although many impoverished patients lack access to clinics, 80 percent of the world’s population lives near a cellphone tower.
  • With mobile devices like this, home health aides could start to provide diagnostic services, and they could also take pictures over time to show doctors whether a patient is getting better. We’ve got an opportunity to leapfrog some of the costs of health care.”—
  •  
    Incredible story of how cell phones will be used to diagnose disease - a PERFECT movie!
  •  
    Wow!!! Using cell phone technology, high powered medical diagnosis and lab work can be provided remotely through cameras. This is what letting students work with cell phones can do as this is Daniel Fletcher and his undergraduates at the University of California worked to create a mobile diagnosis tool from cell phones. THIS is innovation. Harness the untapped power of student creativity and innovation and use it as a learning process. DO IT NOW!!
Vicki Davis

FOXNews.com - Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - Sc... - 0 views

  • An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
  • Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
  • 85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someone about it.
  • ...10 more annotations...
  • Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
  • she went to a mental-health clinic
  • assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
  • They think that’s just part of online life,
  • Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
  • Cyberbullying peaks in 4th and 7th grade
  • 4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
  • The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
  • “This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
  • October as National Cyber Security Awareness Month,
  •  
    Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children. There are mention of several websites including one I'd never heard of called CyberBully Alert.
  •  
    You should consider mentioning cyberbullying as an issue. This might also be a topic of interest to push forward for a social entreprenuership video.
Dylan Cochrac

History of the World Wide Web - Wikipedia, the free encyclopedia - 0 views

  • The World Wide Web ("WWW" or simply the "Web") is a global information medium which users can read and write via computers connected to the Internet.
  • Tim Berners-Lee
  •  
    This tells what the world wide web is and gives the history of it.
  •  
    "The World Wide Web ("WWW" or simply the "Web") is a global information medium which users can read and write via computers connected to the Internet. The term is often mistakenly used as a synonym for the Internet itself, but the Web is a service that operates over the Internet, as e-mail does. The history of the Internet dates back significantly further than that of the World Wide Web. The hypertext portion of the Web in particular has an intricate intellectual history; notable influences and precursors include Vannevar Bush's Memex,[1] IBM's Generalized Markup Language,[2] and Ted Nelson's Project Xanadu.[1]"
Vicki Davis

Online, teachers walk a fine line | floridatoday.com | FLORIDA TODAY - 1 views

  • And some districts -- from South Dakota to New Jersey -- are starting to limit what teachers can do on the sites.
  • "It is the responsibility of all individuals associated with the Foundation to act in a manner that will ensure the public's trust as well as the trust of colleagues and peers.
  • he has heard that some teachers have "risqué" photos on their accounts, but he hasn't actually seen any.
  • ...2 more annotations...
  • Last month, district officials investigated an e-mail from an unidentified "concerned parent" that included pictures of a woman clad in only a bra and underwear. The photo allegedly was taken from a Sunrise Elementary teacher's MySpace page. The teacher was not identified, and the photos did not show the woman's face.
  • "Teachers are role models, and they don't stop when school gets out," said Credle, whose daughter attends Lockmar Elementary in Palm Bay. "If you don't want people to see it, why post it? Odds are it's going to get out."
  •  
    Teachers have a different standard. It is fascinating to read this newspaper article and also the responses. Our students on Flat Classroom project and Digiteen will be reviewing this information because teachers are held to a higher standard online.
  •  
    Read this to understand that teachers don't really have a personal life online.
Becca B.

IL Toolkit - Virtual Communications: 5 - How do we use Virtual Communications Tools? - 0 views

  •  
    "There are some special rules that apply to communicating virtually. The most important is to remember that you are communicating with real people, not a computer. Don't spam. That is, don't send unsolicited e-mail. Remember that the Internet is a pull system, where people can request information, rather than one where you send them information without being asked. A wise person once suggested you treat the Internet like a foreign culture; study it for a month or more, as an anthropologist would, before you participate. Using this example, it would also be advisable to strongly consider cultural differences of the people with whom we communicate. This entails avoiding profanity and slurs or criticisms against any group of people. It means respecting differences and striving for political correctness in all forms of communication and action. The CD-ROM "Information Literacy Toolkit" provides definitions of legal considerations included in dealing with virtual communications. Below are some ethical considerations for handling them. As with security considerations, ethics in dealing with material handled via virtual communication is rooted in traditional communications. That which applies to the paper world also applies in the virtual world. The fact that information is easily available does not remove traditional requirements for attribution, for the avoidance of plagiarism or for the appropriate use the information. The anonymity provided by the ability to surf and search a large number of documents provides a temptation to use material in an unauthorized way. This temptation must be avoided. The same browsing tools that allow wide access also provide a tool for proper attribution. The writer may simply insert a link (URL) to direct the reader to the source of the information cited. Privacy should be safeguarded and observed. Those who control their own information should establish systems to keep information that they do not want disclosed protected. Owners of
1 - 15 of 15
Showing 20 items per page