Songbird - Open Source Music Player - 1 views
QR Codes in the Classroom - 0 views
YouTube - No Future Left Behind - 0 views
-
For the NetGenEd project, students at Suffern Middle school created a video to challenge and deliver the keynote for the project. It is amazing the script that these students wrote for the project!
-
These students from a middle school in New Jersey shared wrote and created this keynote address for NetGenEd 2009, a Flat Classroom project. It is phenomenal.
National Center for Supercomputing Applications - Wikipedia, the free encyclopedia - 0 views
-
The National Center for Supercomputing Applications (NCSA) is a state-federal partnership to develop and deploy national-scale cyberinfrastructure that advances science and engineering. NCSA operates as a unit of the University of Illinois at Urbana-Champaign but it provides high-performance computing resources to researchers across the country. Support for NCSA comes from the National Science Foundation, the state of Illinois, the University of Illinois, business and industry partners, and other federal agencies.
-
These centers were founded when a group of University of Illinois faculty, led by Larry Smarr, sent an unsolicited proposal to the National Science Foundation in 1983. The foundation announced funding for the supercomputer centers in 1985; the first supercomputer at NCSA came online in January 1986.
-
NCSA provides leading-edge computing, data storage, and visualization resources. NCSA computational and data environment implements a multi-architecture hardware strategy, deploying both clusters and shared memory systems to support high-end users and communities on the architectures best-suited to their requirements. Nearly 1,360 scientists, engineers and students used the computing and data systems at NCSA to support research in more than 830 projects. A list of NCSA hardware is available at NCSA Capabilities
- ...3 more annotations...
One Laptop per Child (OLPC): Vision - 0 views
-
They learn, share, create, and collaborate. They become connected to each other, to the world and to a brighter future.
4 Advantages to Outsourcing - 1 views
-
Outsourcing can save you money
-
Economies of scale save money when unit costs go down as volumes increase
-
Outsourcing can help you share risk.
- ...2 more annotations...
Gale World History In Context - Document - 1 views
-
-
this pioneering pair have used technology.
-
may have revolutionised the African classroom.
- ...7 more annotations...
IL Toolkit - Virtual Communications: 5 - How do we use Virtual Communications Tools? - 0 views
-
"There are some special rules that apply to communicating virtually. The most important is to remember that you are communicating with real people, not a computer. Don't spam. That is, don't send unsolicited e-mail. Remember that the Internet is a pull system, where people can request information, rather than one where you send them information without being asked. A wise person once suggested you treat the Internet like a foreign culture; study it for a month or more, as an anthropologist would, before you participate. Using this example, it would also be advisable to strongly consider cultural differences of the people with whom we communicate. This entails avoiding profanity and slurs or criticisms against any group of people. It means respecting differences and striving for political correctness in all forms of communication and action. The CD-ROM "Information Literacy Toolkit" provides definitions of legal considerations included in dealing with virtual communications. Below are some ethical considerations for handling them. As with security considerations, ethics in dealing with material handled via virtual communication is rooted in traditional communications. That which applies to the paper world also applies in the virtual world. The fact that information is easily available does not remove traditional requirements for attribution, for the avoidance of plagiarism or for the appropriate use the information. The anonymity provided by the ability to surf and search a large number of documents provides a temptation to use material in an unauthorized way. This temptation must be avoided. The same browsing tools that allow wide access also provide a tool for proper attribution. The writer may simply insert a link (URL) to direct the reader to the source of the information cited. Privacy should be safeguarded and observed. Those who control their own information should establish systems to keep information that they do not want disclosed protected. Owners of
« First
‹ Previous
101 - 110 of 110
Showing 20▼ items per page