Skip to main content

Home/ ITGSopedia/ Group items tagged programming

Rss Feed Group items tagged

Barbara Stefanics

XML Files - XML Tutorial - Introduction to XML - What is XML? - 0 views

  •  
    XMLFiles.com provides web developers with a basic introduction to programming in XML, XML DTD, XML DOM, XML XSL, XML RSS and ASP.NET. Learn how to create basic XML programs from XMLFile.com's expert tutorials and example code.
Madeleine Brookes

Udacity - Artificial Intelligence Course (CS373) - 1 views

  • Learn how to program all the major systems of a robotic car from the leader of Google and Stanford's autonomous driving teams
  •  
    Learn how to program all the major systems of a robotic car from the leader of Google and Stanford's autonomous driving teams.Udacity was founded by three roboticists who believed much of the educational value of their university classes could be offered online. A few weeks later, over 160,000 students in more than 190 countries enrolled in our first class, "Introduction to Artificial Intelligence."
Sandra Stark

Thinking Machine 4 - 3 views

  •  
    Thinking Machine 4 explores the invisible, elusive nature of thought. Play chess against a transparent intelligence, its evolving thought process visible on the board before you. The artwork is an artificial intelligence program, ready to play chess with the viewer. If the viewer confronts the program, the computer's thought process is sketched on screen as it plays. A map is created from the traces of literally thousands of possible futures as the program tries to decide its best move. Those traces become a key to the invisible lines of force in the game as well as a window into the spirit of a thinking machine.
Sandra Stark

Science Friday Archives: Online Privacy - 0 views

  •  
    Facebook has dozens of toggles for privacy settings on its service, and a privacy policy longer than the US Constitution. And while many users of the service know that they're sharing information with their friends and associates, they may be surprised to find out just exactly what they're sharing, and with what groups of people. New programs that offer to tie social media integration into outside web sites offer an ever-more social experience, but they also expose even more of your online activities to social media service providers and advertisers. Is it getting too hard to keep hold of our privacy online?
Julie Lindsay

3D printing story - flat class project - YouTube - 1 views

  •  
    Video created by Flat Classroom teacher Avylon Magarey as part of the Flat Classroom Certified Teacher course http://www.flatclassroomproject.net/certified-teacher-program.html
Julie Lindsay

DistanceLearning - 0 views

  •  
    Info graphic showing statistics of the growth of distance learning programs among today's college students.
Barbara Stefanics

The Legal Implications of Surveillance Cameras | District Administration Magazine - 0 views

  •  
    "The Legal Implications of Surveillance Cameras District administrators need to know the law and make these policies clear. By: Amy M. Steketee District Administration, February 2012 undefined The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education reported that more than half of all public schools used security cameras during the 2007-2008 school year to monitor students, a 30 percent increase over eight years prior. While security cameras can be useful in addressing and deterring violence and other misconduct, they also raise several legal issues that can leave school administrators in a quandary. Does the use of surveillance cameras to capture images violate a student or staff member's right of privacy? If the images captured on a surveillance recording are of a student violating school rules, may district administrators use the recording in a disciplinary proceeding? If so, are parents of the accused student entitled to review the footage? What about parents of other students whose images are captured on the recording? How should schools handle inquiries from media about surveillance footage? Can administrators use surveillance cameras to monitor staff? I outline the overriding legal principles, common traps for the unwary and practical considerations. Advertisement Legal Principles Fourth Amendment to the U.S. Constitution. The Fourth Amendment prohibits the government, including public schools, from conducting unreasonable searches or seizures. Courts have generally held, however, that what an individual knowingly exposes in plain view to the public will not trigger Fourth Amendment protection because no search has occurred. Someone who is videotaped in public has n
Madeline Brownstone

Doctor and Patient - Texting as a Health Tool for Teenagers - NYTimes.com - 1 views

  •  
    "This past month in the journal Pediatrics, researchers at Mount Sinai Hospital in New York published the results of a study showing that text messaging could significantly improve the rate of adherence among young liver transplant patients. Using a program called CareSpeak, the researchers issued text messages to a group of 41 pediatric liver transplant patients. The text messages reminded the patients to take their medications, which ranged from one to three different pills once or twice a day. "
  •  
    An older article, but relevant nonetheless.
Barbara Stefanics

Business Software Alliance - About BSA & Members - 1 views

  •  
    Includes policies, research, statistics, latest news.
  •  
    Public policy and Anti-piracy compliance programs
Sandra Stark

2010 Horizon Report ยป Executive Summary - 0 views

  •  
    The annual Horizon Report describes the continuing work of the New Media Consortium's Horizon Project, a qualitative research project established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, or creative inquiry on college and university campuses within the next five years. The 2010 Horizon Report is the seventh in the series and is produced as part of an ongoing collaboration between the New Media Consortium (NMC) and the EDUCAUSE Learning Initiative (ELI), an EDUCAUSE program.
Carol Hancox

BBC NEWS | Technology | Technique links words to signing - 0 views

  •  
    SiSi (say it sign it) uses speech recognition to animate an aviator. Will allow for automatic signing e.g. for meetings, TV programs.
Julie Lindsay

Kudos for Kodu, the language of kids - 0 views

  •  
    Intuitive, visual programming tool allows students to play 'games' while learning science
Sandra Stark

BAN to Certify and Audit E-Waste Recycling - NYTimes.com - 0 views

  •  
    The Basel Action Network, an American watchdog group that has sought to curb the export of toxic electronic waste from the United States, plans to begin a new certification and auditing program on Thursday for both recyclers and companies that generate electronic refuse.
Sandra Stark

The 'Worm' That Could Bring Down The Internet : NPR - 0 views

  •  
    Outstanding show, explains a lot about worms vs viruses as well as botnets. It's an interview with the author so it also illustrates how to ask good questions. (useful for the project) The gigantic networked system created by the Conficker worm is what's known as a "botnet." The Conficker botnet is powerful enough to take over computer networks that control banking, telephones, security systems, air traffic control and even the Internet itself, says Bowden. His new book, Worm: The First Digital World War, details how Conficker was discovered, how it works, and the ongoing programming battle to bring down the Conficker worm, which he says could have widespread consequences if used nefariously.
Barbara Stefanics

GIMPshop.com - A GIMP hack by Scott Moschella - 1 views

  •  
    "GIMPshop is a modification of the free/open source GNU Image Manipulation Program (GIMP), intended to replicate the feel of Adobe Photoshop. Its primary purpose is to make users of Photoshop feel comfortable using GIMP."
Madeline Brownstone

How Uber Uses Psychological Tricks to Push Its Drivers' Buttons - 1 views

  •  
    "To keep drivers on the road, the company has exploited some people's tendency to set earnings goals - alerting them that they are ever so close to hitting a precious target when they try to log off. It has even concocted an algorithm similar to a Netflix feature that automatically loads the next program, which many experts believe encourages binge-watching. In Uber's case, this means sending drivers their next fare opportunity before their current ride is even over. And most of this happens without giving off a whiff of coercion. "We show drivers areas of high demand or incentivize them to drive more," said Michael Amodeo, an Uber spokesman. "But any driver can stop work literally at the tap of a button - the decision whether or not to drive is 100 percent theirs.""
1 - 20 of 28 Next ›
Showing 20 items per page