Avoiding Internet Trolls by Avoiding Twitter
Mike Elgin suggests that Twitter is more open to trolling because of less ability to limit comments.
-DDInformation Sources & Information Sifting Techniques
I am a retired librarian, most recently serving at Indiana Wesleyan University's Cleveland Education Center.
Mike Elgin suggests that Twitter is more open to trolling because of less ability to limit comments.
-DDJeremy Kirk warns that iPhone and iPad security can be compromised by connecting to an infected computer .
-DDLabels: Apple iPad, Apple iPhone, Mobile security
Sean Junkins created a video clip of fifty quotes about education and technology .
-DD
Labels: Educational techology, quotations
Barry Schwartz maintains SEO Roundtable with text and video reports on trends in search engines such as Google and Bing.
-DDZach Miners explains how the Google safe browsing service will scan Chrome, FireFox and Safari downloads for components which will add new programs or otherwise alter your computer as a virus might. Users will get a warning that the download has been blocked from loading by the browser. Users may still open the file in their download folder.
-DDLabels: google, internet security
Michael Gorman shares Websites which every educator should bookmark. These include the Open Library with its public domain books, and YourNextRead.com with its guidance for finding books which match a title you suggest. This is fourth in Gorman's continuing series on useful websites; some others in this series can be seen here:
Labels: educational websites, matching websites
Ellen Ullman shares tips for developing professional development training to educators (and others). She provides valuable dos and don'ts for those creating a quality learning experience.
-DDNancy Sims recently evaluated a flowchart used to recommend how to deal with copyright and copyright issues.
-DD
Source: Langwitches.org
Patrick Nelson predicts that the Web's underlying TCP/IP protocol shall be replaced by Random Linear Network Coding (RLNC) which uses algorithms to correct errors at a message's receiving end. This is supposed to be a much faster technology for distributing video feeds, etc.
-DDLabels: Random Linear Network Coding, TCP/IP
Grant Gross reports on research into using radio waves to distribute energy for running small devices.
-DDLabels: ambient energy
Michael Cooney reports that the U.S. Defense Department is striving to identify biologic markers of extraordinary intelligence . They are looking for means of discerning, using brain waves or some some other observable method, a way of quickly determining ability.
-DDLabels: intelligence
Mike Elgan provides background on the manipulation of personal relationships which can occur when social networking companies play mind games with their customers.
-DDLabels: mind altering, social networking
John Villasenor makes a plea for Intellectual Property law to be an element of university curricula. If students are going to be taught to develop new innovations, they should also be taught how to benefit from these new technologies and artistic works.
-DDLabels: Curricula, intellectual property
Zach Minors reports that Bing is now able to interpret chatty (natrual language) queries . If a user asks who was the first president of the United States, an image of George Washington and a brief biography appears.
-DD
Labels: Bing, natural language search
Devon Haynie promotes some tips on how to be an excellent online student .
-DDLabels: Online Education, student succes, Study habits
Rachel Toor lists the things you should know before publishing a book .
-DDLabels: academic publishing
Dianna Booher notes three common communication errors which leaders often make. She provides an example of each type of inconsistent or contradictory message in a short, three minute blog post.
-DDLabels: communication
Sharon Gaudin notes research currently underway toward creating vision correcting displays which may allow those with eyeglasses to view their computer monitor or cell phone display and view the tiny details without their eyeglasses. If the vision profiles can be easily programmed and the equipment becomes mass produced, then this could be a valuable technology for assisting those with blurred vision.
-DD
Labels: corrective lenses, displays, sight, vision
MIT Media Lab has developed a prototype FingerReader device which reads aloud from the text of printed books. This should be a boon to the visually impaired.
-DDLabels: FingerReader, Visually handicapped
William Deresiewicz provides a critique of the film Ivory Tower in a lengthy article in The Chronicle of Higher Education.
-DDLabels: Higher Education, Ivory Tower
Christopher Null provides a list of ten tools for productive telecommuting .
-DDLabels: home office, Telecommuting, telepresence, work from home
Katherine Mangan explores in a Chronical of Higher Education article how a percentage of students come close to graduation and then drop out. According to a report issued by the National Student Clearinghouse Research Center, many of these students might be able to complete a degree if targeted effort was applied to help these students.
Comments on Mangan's article indicate that the plight of the "almost graduated" has been known for some time, but the focus of government funding on traditional students has kept the focus away from helping adult learners complete their degree. The school where I am employed has made adult students a priority, and the staff and faculty make every effort to help students complete their degree.
-DDLabels: Degree completion, graduation rate
Brad Chacos shares ten visually stunning sites derived from data. Often this data is collected in real time.
-DDLabels: data display, data visualization
The Chronicle of Higher Education has developed a chart that shows the increasing percentage of college funds directed to student services and creature comforts on campus.
-DDDan Goodwin warns of the "Bad USB " threat. I predict that the ability to reprogram USB drives shall result in a massive market for hardened USB drives.
-DDLabels: hacker, Threat vectors, USB Drives
Sharon Gaudin reports on Google's [health] baseline study , which endeavors to discover the traits of healthy people.
-DD
Nichole Perlroth and David Gelles report in the New York Times that a Russan gang has stolen over a billion username and password combinations , placing everyone at risk of identity theft. The experts recommend frequently changing passwords to avoid such threats.
-DDLabels: hacker, identity theft
Michael Cooney warns that scammers want to wreck your business, vacation travel . Tips for safe computing are provided.
-DDJohn Gross quotes the GAO as saying that "Majority of large ISPs now using monthly data caps ." Glenn Fleishmann in February mused about whether broadband data caps are inevitable, noting that most of the stimulus for caps comes from those who distribute movies over the Internet and who wish to minimize the services of firms such as Netflix.
-DDEleni Zazani has abstracted the contents of several reports on MOOCs on her blog.
-DDMark Gibbs explores a new commercial database of consumer products . Note that access to this commercial product requires a hefty subscription fee.
-DDLabels: Indix
Serdar Yegulalp from InfoWorld reports on new Mozilla projects . Some of these are software tools for improving Mozilla's FireFox Web browser, and others are useful tools for exploring the Web.
-DDThe National Library of Medicine maintains a database relating to the medical hazards of toxic chemical .
-DDLabels: National Library of Medicine, TOXNET