Skip to main content

Home/ K12 Open Source/ Group items tagged networks

Rss Feed Group items tagged

Mark Chambers

Spiceworks - Free Network Monitoring Software for Network Management - 0 views

  •  
    ou want a network you can manage, not a network that manages you! You wish you could have it... without spending a fortune. Your wish is granted.ou want a network you can manage, not a network that manages you! You wish you could have it... without spending a fortune. Your wish is granted.
Claude Almansi

Ning's New Deadline for Pay-Only: Aug. 30 « Educational Technology and Change... - 0 views

  •  
    "Ning announced repeatedly that it would delete free networks whose creators had not paid for one of its new pricing plans by midnight Aug. 20. On Aug. 21, however, Ning extended this deadline to August 30. Here's the announcement of this extension on its Help page: Deadline for Selecting a Ning Plan Extended to August 30, 2010 A number of Network Creators, particularly those based outside the United States, have requested more time to arrange for payment and make the right decision on a plan for their network. As a result, we have extended the deadline for selecting one of the three new plans (Ning Mini, Plus and Pro) to August 30, 2010. Beginning on this date, we will block access to any free Ning Network that isn't subscribed to one of the three plans. Please let us know if we can help, or if you have questions or comments. Thank you!"
Claude Almansi

Why Unjoin Ning Networks that Won't Pay « Educational Technology and Change J... - 1 views

  •  
    "It therefore seems advisable to protect your data by unjoining Ning networks whose creators do not intend to pay for a Ning plan. This includes talketc.ning.com, the Ning network for ETC Journal. Moreover, when you unjoin a Ning network, you have the option to delete everything you contributed to it - you might wish to do that too. "
Claude Almansi

WebCite 4 "Deletion of Free Ning Networks?" Ning Creators 2010-09-18 - Alex - 1 views

  •  
    A wonders about free networks being stull online. Exchange with Thunder X. Eric Suesz:\n"Hi, Alex. All free Ning Networks are now locked and can't be accessed. At some point, the space the data takes up on our servers will be overwritten. There's no plan to send you an email when that happens."
  •  
    A very odd affirmation by Ning's Eric Suesz
Jeff Johnson

4.2.2.2: The Story Behind a DNS Legend - 0 views

  •  
    Chances are that if you're a network operator you know the IP address 4.2.2.2. It's an easy to type and easy to remember address, which since 1998 has been a "beefy" DNS service responding to the public Internet. Since you need DNS before you can use anything other than IP addresses on the Internet, it can come in handy for testing or initial configuration. Before Google started doing public DNS service on 8.8.8.8, and because 4.2.2.2 is typically pretty fast, many people have used it as their standard DNS server. Since the most basic test of Internet connectivity you can do is to ping an IP address (with DNS disabled), a "ping -n 4.2.2.2" can tell you if your networking problem is at a higher level or a lower level right away. Is this just an accident, or was this a deliberate choice? Was it intentionally set up as a public DNS service, or an accident. I've wondered this for years. But just recently I was investigating a networking oddness reported by Kyle who uses this, and I decided to try to dig deep and find out the story behind whatI imagine is one of the most famous IP addresses on the public Internet.
Claude Almansi

WebCite archive for "Crossing the Boundaries of Ning" Badan Barman - Ning Creators 2010... - 1 views

  •  
    "Crossing the Boundaries of Ning * Posted by Badan Barman on August 22, 2010 at 2:28am in Best Practices and Lessons Learned * View Discussions I am a Library and Information Science Professional from India. I developed a Network "LIS Links : A Virtual Community of Indian LIS Professionals" (http://lislinks.com/) over Ning. I dont know whether I will be able to survive with all of you or not. But here, I would like to share something about my site. There nothing special to its design, since I am dealing with information, I gave much emphasis to content rather than the look. But I think I have included some thing special in my network. I request you all to have a look. Here are my specific points ..."
Claude Almansi

Restriction of Intellectual Property from Ning - Creators - Amilla 2010-09'14 - 0 views

  •  
    " * Posted by amilla on September 14, 2010 at 2:26pm in Improvements to Ning Creators * View Discussions About the exclusion of the music player in the package "ning plus" I would like to inform the management of Ning that I demand from Ning administration to send me an e-mail with all the tracks that are blocked in order to protect the copyrighted material that now is blocked by the company Ning which has no right to withhold them. For these reasons I ask from Ning to send me the music files that was loaded up until the day that Ning music player was free for uploading for all networks. There is need for appropriate administration of music files with responsibility for all of the musicians members of my network. So I demand from Ning to send me all that music files. I am giving to Ning a period of two months to send me all the songs as attachments in the e-mail amilla.gr@gmail.com. Otherwise I have to inform the official intellectual property protecting organization of Greece for unauthorized restriction of intellectual property from the Ning. The same reasoning applies if the music files are deleted from Ning. Thank you and wait for response from Ning. Best regards The administration of www.amilla.gr"
Claude Almansi

Ancora in margine ad una discussione su pubblicazioni open access vs. pubblic... - 0 views

  •  
    "Kaj Sand-Jensen, un professore danese di ecologia, ha scritto un articolo intitolato "How to write consistently boring scientific literature" dove enuncia un decalogo di regole per scrivere articoli scientifici veramente noiosi. In maniera ironica e divertente mostra come una scrittura spersonalizzata possa servire alla fin fine a mascherare un contenuto modesto. Nella conclusione, osserva che ci sono movimenti di scienziati e anche editori che tendono a recuperare il valore di una scrittura più personale e viva. Sostiene inoltre che, sebbene l'articolo scientifico così come lo conosciamo rimarrà il veicolo principale della comunicazione scientifica, è auspicabile che gli scienziati si impegnino maggiormente in una comunicazione più ampia e speculativa, che possa eventualmente anche contemplare humour e poesia. Una comunicazione in grado di far circolare maggiormente le idee fra campi diversi e di attrarre più facilmente i giovani allo studio delle scienze. È un paradosso, ma è vero che la letteratura scientifica predominante, bulimica, ridondante, assolutamente grigia, selezionata con un processo di peer review sempre più affrettato e sommario, costituisce non l'unica ma una notevole causa di scarsa innovazione dando la preferenza ai maggiori e più consolidati filoni di ricerca. Lascio qui sotto l'opportunità di leggere il paper di Kaj Sand-Jensen, ne vale la pena. View this document on Scribd - [1] More about Fisica e filosofia "Ricordo delle discussioni con Bohr che si prolungarono per molte ore fino a notte piena e che ci condussero quasi ad uno stato di disperazione; e quando al termine della discussione me ne andavo solo a fare una passeggiata nel parco vicino continuavo sempre a ripropormi il problema: è possibile che la natura sia così assurda come ci appariva negli esperimenti atomici?" Werner Heisenberg in Fisica e Filosofia, Il Saggiatore, 1961, p. 55) * Share this: * Stampa * Email * Facebook *
Claude Almansi

wwwedu : Really bad Social networking sites legislation in Illinois (N. Willard) - 0 views

  •  
    It is impossible for the sites to do this. There is no way to independently identify the age and identify of minors. There is no RealID system for minors! More on the infeasibility here: http://cyber.law.harvard.edu/research/isttf Seems to me to be a major opportunity for Illinois high school educators to get your students involved in learning about the legislative process. My perspective is that the only reasonable option for Facebook, MySpace and any other social networking site would be to terminate the accounts of any minors who live in Illinois because it would be impossible for them to do this. The penalties for non-compliance would be pretty tough. Many co-sponsors. You might want to alert your students. They are the ones who would be impacted.
Claude Almansi

Google Wants Its Own Fast - WSJ.com - VISHESH KUMAR, CHRISTOPHER RHOADS - dec. ? 2008 - 0 views

  •  
    The celebrated openness of the Internet -- network providers are not supposed to give preferential treatment to any traffic -- is quietly losing powerful defenders. Google Inc. has approached major cable and phone companies that carry Internet traffic with a proposal to create a fast lane for its own content, according to documents reviewed by The Wall Street Journal. Google has traditionally been one of the loudest advocates of equal network access for all content providers.
Claude Almansi

ReadWriteWeb: [about page] - 0 views

  •  
    ReadWriteWeb is a popular weblog that provides Web Technology news, reviews and analysis. It is the lead blog in the ReadWriteWeb Network, a growing network of blogs about web technology - the other sites are last100 (a blog about Digital Lifestyle), AltSearchEngines (about search) and ReadWriteTalk (a podcasting show about the people behind the Web)
Claude Almansi

Utimaco's Lawful Interception Management System - 0 views

  •  
    Utimaco LIMS distinguishes itself among competitive solutions by its comprehensive multivendor support. It integrates seamlessly with more than 200 different network nodes (switches, routers, gateways, application servers) by all leading infrastructure vendors. Utimaco LIMS enables realtime monitoring of telephony, fax, SMS, MMS, e-mail, VoIP, Push-to-Talk and other IP-based communication services. The modular architecture of LIMS facilitates cost-efficient LI solutions for small operators and is scalable for surveillance networks with several thousand concurrent intercepts. Utimaco LIMS mediates and delivers data in accordance with international LI standards by ETSI, 3GPP, ANSI/ATIS and Cablelabs. The highest security requirements are implemented in LIMS to protect all private data from eavesdropping and manipulation.
Jeff Johnson

Mahara - open source e-portfolio system - 1 views

  •  
    Mahara is an open source e-portfolio system with a flexible display framework. Mahara, meaning 'think' or 'thought' in Te Reo Māori, is user centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. Mahara also features a weblog, resume builder and social networking system, connecting users and creating online learner communities.
Claude Almansi

OneWEB.tv » Five Questions With Dennis Lembrée - Creator of Accessible Twitter - 0 views

  •  
    Twitter has changed from being a tool most people thought is simply yet another way for people on the Internet to waste time to a platform for social change, social networking and dare I say it even business. One of the aspects that Twitter has been lacking is an accessible interface to the service. Thankfully Dennis Lembrée is changing all this. Schalk Neethling sat down with Dennis to learn more about Accessible Twitter, the problems he faces in creating it and what the future will hold.
James Sigler

DEN IN SL | Google Groups - 0 views

  •  
    Discovery Educator Network in Second Life
Claude Almansi

Superintendent Trojan [Bundestrojaner in D] - News - The H Security: News and features - 0 views

  •  
    Whilst listening in on normal telephone calls over landlines or mobile phone networks has become a routine procedure, Voice over IP connections frequently present a problem for investigators, especially when the persons being monitored use Skype via foreign servers or call direct from PC to PC and encrypt their data. The Swiss Department of the Environment, Transport, Energy and Communications (UVEK) is therefore examining the use of spy software to allow it to listen in on conversations on PCs.
Claude Almansi

Copiar la red para que funcione en tu ordenador personal - RedEs - Catalin Trandafir 2... - 0 views

  •  
    " * Publicado por Catalin Trandafir el agosto 21, 2010 a las 11:48am en Creador de la Red Primero hay que descargar y instalar este programa : HTTrack Website Copier , Entras en la pagina de tu red como creador y la dejas abierta . Luego hay que ejecutar el programa HTTrack Website Copier y ponerlo que copie tu red ( hay que ponerle la dirección de tu red ). Cuando todo esta copiado , buscas en tu ordenador la carpeta donde se ha copiado todo ( esta te la muestra el programa en el principio ) y le das doble click al fichero ejecutable con nombre de tu pagina . de este modo la pagina se ejecuta en tu ordenador para que veas todo lo que contiene , casi igual que en NING , solo hay algunos enlanches que te manda a la misma pagina original , pero en la mayoría de las paginas funciona bien desde tu ordenador. Espero que lo entendéis , si no os doy mas explicaciones."
Art Gelwicks

Cyber Punk Cafe: List of Free Open Source Alternatives to Norton Ghost - 0 views

  •  
    Listing of open source alternatives to Norton Ghost for easy machine restoration.
Clif Mims

EdTech Action Network - 0 views

  •  
    "ETAN provides a forum for educators and others to engage in the political process and project a unified voice in support of a common cause - improving teaching and learning through the systemic use of technology. ETAN's mission is to influence public policy-makers at the federal, state and local levels and to increase public investment in the competitiveness of America's classrooms and students."
1 - 20 of 20
Showing 20 items per page