Skip to main content

Home/ Flat Classroom Project/ Group items matching "B" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Kyle Correa

negative impacts of the world wide web on education - Google Search - 1 views

  • Computers, the internet, and cheating among secondary school ...pareonline.net/getvn.asp?v=9&n=9Cached - SimilarYou +1'd this publicly. Undoby S Conradson - Cited by 14 - Related articlesPermission is granted to distribute this article for nonprofit, educational ... And the vast realms of information on the truly, worldwide Web are so readily available. ..... policies that carry seriou
Mackenzie Hyde

workflow definition of workflow in the Free Online Encyclopedia. - 0 views

    • Mackenzie Hyde
       
      Helps define workflow software
  • The automatic routing of documents to the users responsible for working on them
  • Workflow is concerned with providing the information required to support each step of the business cycle.
  • ...4 more annotations...
  • workflow
  • workflow - The scheduling of independent jobs on a computer
  • workflow - The set of relationships between all the activities in a project, from start to finish.
  • workflow - The movement of documents around an organisation for purposes including sign-off, evaluation, performing activities in a process and co-writing.
AlyssaP p

Gale Power Search - Document - 0 views

  • Apple has produced a new version of its iPad tablet computer, according to US reports. The iPad 2 is thinner and lighter with more memory, a more powerful graphics processor and at least one camera, said the Wall Street Journal.
  • At the debut of News Corp's Daily online paper in New York, a Reuters reporter saw what appeared to be the new iPad with a front-facing camera.
  • Since introducing the iPad in April 2010, Apple claims to have sold 14.8m units, which contributed $4.6bn or 17% of the company's overall revenue in the last quarter of the year.
  • ...3 more annotations...
  • The iPad continues to dominate the tablet computer market, but competitors Dell and HP have recently announced plans for rival products in 2011.
  • Source Citation   (MLA 7th Edition) "News." Computer Weekly 15 Feb. 2011. Student Resources in Context. Web. 1 Mar. 2013.Document URLhttp://go.galegroup.com/ps/i.do?id=GALE%7CA249163703&v=2.1&u=midd21104&it=r&p=GPS&sw=w
  • Document Type: Brief article Full Text: COPYRIGHT 2011 TechTarget http://www.computerwee
  •  
    This is my first resource for my flattener #10 research 
Erin B

Tim Berners-Lee - Wikipedia, the free encyclopedia - 0 views

  • Sir Timothy John "Tim" Berners-Lee, OM, KBE, FRS, FREng, FRSA (Born 8 June 1955,[1] also known as "TimBL"), is a British engineer and computer scientist and MIT professor credited with inventing the World Wide WeB, making the first proposal for it in March 1989.
  • While an independent contractor at CERN from June to December 1980, berners-Lee proposed a project based on the concept of hypertext, to facilitate sharing and updating information among researchers.[9] While there, he built a prototype system named ENQUIRE
  • In November 2009, berners-Lee launched the World Wide Web Foundation in order to "Advance the Web to empower humanity by launching transformative programs that build local capacity to leverage the Web as a medium for positive change."
  •  
    Who Tim Berners-Lee is.
  •  
    While an independent contractor at CERN from June to December 1980, berners-Lee proposed a project based on the concept of hypertext, to facilitate sharing and updating information among researchers.[9] While there, he built a prototype system named ENQUIRE.[
matthew hilliard

Wireless - Wikipedia, the free encyclopedia - 0 views

  • Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "wires".
  • Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires.
  • The term "wireless" should not be confused with the term "cordless", which is generally used to refer to powered electrical or electronic devices that are able to operate from a portable power source (e.g. a battery pack) without any cable or cord to limit the mobility of the cordless device through a connection to the mains power supply.
  •  
    "Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires."
  •  
    "One of the best-known examples of wireless technology is the mobile phone"
Claire C.

Personal digital assistant - Wikipedia, the free encyclopedia - 0 views

  • A personal digital assistant (PDA), also known as a palmtop computer,[1][2] is a mobile device that functions as a personal information manager.
tommy s

Outsourcing - Wikipedia, the free encyclopedia - 0 views

  • Outsourcing or sub-servicing often refers to the process of contracting to a third-party.
  • Cost savings — The lowering of the overall cost of the service to the business. This will involve reducing the scope, defining quality levels, re-pricing, re-negotiation, and cost re-structuring. Access to lower cost economies through offshoring called "labor arbitrage" generated by the wage gap between industrialized and developing nations.[10] Focus on Core business — Resources (for example investment, people, infrastructure) are focused on developing the core business. For example often organizations outsource their IT support to specialised IT services companies. Cost restructuring — Operating leverage is a measure that compares fixed costs to variable costs. Outsourcing changes the balance of this ratio by offering a move from fixed to variable cost and also by making variable costs more predictable. Improve quality — Achieve a steep change in quality through contracting out the service with a new service level agreement. Knowledge — Access to intellectual property and wider experience and knowledge.[11] Contract — Services will be provided to a legally binding contract with financial penalties and legal redress. This is not the case with internal services.[12] Operational expertise — Access to operational best practice that would be too difficult or time consuming to develop in-house. Access to talent — Access to a larger talent pool and a sustainable source of skills, in particular in science and engineering.[13][14] Capacity management — An improved method of capacity management of services and technology where the risk in providing the excess capacity is borne by the supplier. Catalyst for change — An organization can use an outsourcing agreement as a catalyst for major step change that can not be achieved alone. The outsourcer becomes a Change agent in the process. Enhance capacity for innovation — Companies increasingly use external knowledge service providers to supplement limited in-house capacity for product innovation.[14][15] Reduce time to market — The acceleration of the development or production of a product through the additional capability brought by the supplier.[16] Commodification — The trend of standardizing business processes, IT Services, and application services which enable to buy at the right price, allows businesses access to services which were only available to large corporations. Risk management — An approach to risk management for some types of risks is to partner with an outsourcer who is better able to provide the mitigation.[17] Venture Capital — Some countries match government funds venture capital with private venture capital for start-ups that start businesses in their country.[18] Tax benefit — Countries offer tax incentives to move manufacturing operations to counter high corporate taxes within another country. Scalability — The outsourced company will usually be prepared to manage a temporary or permanent increase or decrease in production. Creating leisure time — Individuals may wish to outsource their work in order to optimise their work-leisure balance.[19] Liability — Organizations choose to transfer liabilities inherent to specific business processes or services that are outside of their core competencies. [edit] Implications
  •  
    Definition of outsourcing: "Outsourcing or sub-servicing often refers to the process of contracting to a third-party."
  •  
    wikipedia on outsourcing
  •  
    overview of outsourcing
hannah h

Digitizing - Wikipedia, the free encyclopedia - 0 views

  • Digitizing or digitization[1] is the representation of an object, image, sound, document or a signal (usually an analog signal) by a discrete set of its points or samples. The result is called digital representation or, more specifically, a digital image, for the object, and digital form, for the signal. Strictly speaking, digitizing means simply capturing an analog signal in digital form. For a document the term means to trace the document image or capture the "corners" where the lines end or change direction.
  •  
    Definition of digitization"Digitizing or digitization[1] is the representation of an object, image, sound, document or a signal (usually an analog signal) by a discrete set of its points or samples. The result is called digital representation or, more specifically, a digital image, for the object, and digital form, for the signal. Strictly speaking, digitizing means simply capturing an analog signal in digital form. For a document the term means to trace the document image or capture the "corners" where the lines end or change direction."
laken lewis

MSN - Wikipedia, the free encyclopedia - 0 views

  • MSN (originally The Microsoft Network) is a collection of Internet sites and services provided by Microsoft. The Microsoft Network debuted as an online service and Internet service provider on August 24, 1995, to coincide with the release of the Windows 95 operating system.[2]
wildcat wildcat

BitTorrent - 0 views

  • BitTorrent is a peer-to-peer program developed By Bram Cohen and BitTorrent, Inc. used for uploading and downloading files via the BitTorrent protocol. BitTorrent was the first client written for the protocol. It is often nicknamed Mainline By developers denoting its official origins
  •  
    BitTorrent is a peer-to-peer program developed By Bram Cohen and BitTorrent, Inc. used for uploading and downloading files via the BitTorrent protocol. BitTorrent was the first client written for the protocol. It is often nicknamed Mainline By developers denoting its official origins
Riley F.

Optical fiber - Wikipedia, the free encyclopedia - 0 views

  • An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to transmit light between the two ends of the fiber. The field of applied science and engineering concerned with the design and application of optical fibers is known as fiber optics. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference.
  •  
    Definition of fiber optic cables: "An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to transmit light between the two ends of the fiber."
Kaleb B

MSN - Wikipedia, the free encyclopedia - 0 views

  • MSN (originally The Microsoft Network) is a collection of Internet sites and services provided by Microsoft. The Microsoft Network debuted as an online service and Internet service provider on August 24, 1995, to coincide with the release of the Windows 95 operating system.
  • Microsoft used the MSN brand name to promote numerous popular web-based services in the late 1990s, most notably Hotmail and Messenger, before reorganizing many of them in 2005 under another brand name, Windows Live.
clayton lamar

Virtual office - Wikipedia, the free encyclopedia - 0 views

  • A virtual office is a combination of off-site live communication and address services that allow users to reduce traditional office costs while maintaining business professionalism[1]. Frequently the term is confused with “office business centers” or “executive suites” which demand a conventional lease whereas a true virtual office does not require that expense[
  • Virtual Assistant A virtual assistant is often a “lone eagle” working from home, who rarely meets their clients face-to-face[9]. A virtual assistant typically has no access to CTI Software[10]. Rates run $15 an hour and up[11].
laken lewis

AOL - Wikipedia, the free encyclopedia - 0 views

  • AOL Inc. (NYSE: AOL), formerly known as America Online and logo typeset as "Aol.", is an American global Internet services and media company.[4][5] AOL is headquartered at 770 broadway in New York.[6][7] Founded in 1983 as Quantum Computer Services, it has franchised its services to companies in several nations around the world or set up international versions of its services.[8]
wildcat wildcat

Wireless LAN - Wikipedia, the free encyclopedia - 0 views

  • A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network
  •  
    A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network
Toni H.

Radio-frequency identification - Wikipedia, the free encyclopedia - 0 views

  • Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (bAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management. Contents [hide]
  •  
    Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (bAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.
ooechs 0

Mobile Computing : Past , Present and Future - 0 views

  • Mobile Computing : A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link.
  • communications market
  • Today, the mobile data communications market is becoming dominated by a technology called CDPD.
  • ...3 more annotations...
  • Cellular Digital Packet Data (CDPD
  • Speed best
    • ooechs 0
       
      Difference between Mainframe, PC, and Ubiquitous computing. Don't know if this graph is accurate but would be useful if accurate
Trent H

Augmented Reality in Education by Mark billinghurst - 0 views

  • Transitional Interfaces Milgram points out that computer interfaces can be placed on a continuum according to how much of the user's world is generated by the computer [Milgram 94] (figure 4). Moving from left to right the amount of virtual imagery increases and the connection with reality weakens. AR technology can be used to transition users smoothly along this continuum, as shown by the Magicbook work [billinghurst 2001]. Figure 4: Milgram's Reality-Virtuality Continuum
  •  
    Simple Augmented Reality
Bulldog Sharpie

Voice over Internet Protocol - Wikipedia, the free encyclopedia - 0 views

  • Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet telephony, voice over broadband (Vobb), broadband telephony, and broadband phone.
  •  
    This discusses about what voIP is and the history about voIP.
Kunjan P

National Center for Supercomputing Applications - Wikipedia, the free encyclopedia - 0 views

  • The National Center for Supercomputing Applications (NCSA) is a state-federal partnership to develop and deploy national-scale cyberinfrastructure that advances science and engineering. NCSA operates as a unit of the University of Illinois at Urbana-Champaign but it provides high-performance computing resources to researchers across the country. Support for NCSA comes from the National Science Foundation, the state of Illinois, the University of Illinois, business and industry partners, and other federal agencies.
  • These centers were founded when a group of University of Illinois faculty, led by Larry Smarr, sent an unsolicited proposal to the National Science Foundation in 1983. The foundation announced funding for the supercomputer centers in 1985; the first supercomputer at NCSA came online in January 1986.
  • NCSA provides leading-edge computing, data storage, and visualization resources. NCSA computational and data environment implements a multi-architecture hardware strategy, deploying both clusters and shared memory systems to support high-end users and communities on the architectures best-suited to their requirements. Nearly 1,360 scientists, engineers and students used the computing and data systems at NCSA to support research in more than 830 projects. A list of NCSA hardware is available at NCSA Capabilities
  • ...3 more annotations...
  • Today NCSA is collaborating with IbM, under a grant from the National Science Foundation, to build [1] "blue Waters," a supercomputer capable of performing 1 quadrillion calculations per second, a measure known as a petaflop. blue Waters is due to come online in 2011.
  • The Mosaic web browser, the first popular graphical Web browser which played an important part in expanding the growth of the World Wide Web, was written by Marc Andreessen and Eric bina at NCSA. Andreessen and bina went on to develop the Netscape Web browser. Mosaic was later licensed to Spyglass,_Inc. which provided the foundation for Internet Explorer.
  • Initially, NCSA's administrative offices were in the Water Resources Building and employees were scattered across the campus. NCSA is now headquartered within its own Building directly north of the SieBel Center for Computer Science, on the site of a former BaseBall field, Illini Field. NCSA's supercomputers remain at the Advanced Computation Building, But construction is now under way on a Petascale Computing Facility to house Blue Waters.
  •  
    The NCSA is a great stepping stone to the evolution of Web 2.0.
‹ Previous 21 - 40 of 101 Next › Last »
Showing 20 items per page