Skip to main contentdfsdf

Shaun Ferguson's List: D G L Vocabulary

  • n

  • Blogging

    So what is a Blog anyway?

    It’s a good question to ask at the beginning of a Blogging for Beginners Series as it is a question I am asked every week.

    There are a number of ways I could answer this question ranging from the broad to the highly technical.

    Here are a few definitions from other much wiser people on the ‘what is a blog?’ question to get us started (and once you’ve seen what they have to say on the topic I’ll share my own thoughts):

    ‘A weblog is a hierarchy of text, images, media objects and data, arranged chronologically, that can be viewed in an HTML browser.’ Source

    ‘A frequent, chronological publication of personal thoughts and Web links.’ Source

    ‘From “Web log.” A blog is basically a journal that is available on the web. The activity of updating a blog is “blogging” and someone who keeps a blog is a “blogger.”‘ Source

    ‘A weblog is kind of a continual tour, with a human guide who you get to know. There are many guides to choose from, each develops an audience, and there’s also comraderie and politics between the people who run weblogs, they point to each other, in all kinds of structures, graphs, loops, etc.’ Source

    ‘A blog is basically a journal that is available on the web. The activity of updating a blog is “blogging” and someone who keeps a blog is a “blogger.” Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog. Postings on a blog are almost always arranged in cronological order with the most recent additions featured most prominantly.’ Source

    ‘A blog is a website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened form of weblog or web log. Authoring a blog, maintaining a blog or adding an article to an existing blog is called “blogging”. Individual articles on a blog are called “blog posts,” “posts” or “entries”. A person who posts these entries is called a “blogger”. A blog comprises text, hypertext, images, and links (to other web pages and to video, audio and other files). Blogs use a conversational style of documentation. Often blogs focus on a particular “area of interest”, such as Washington, D.C.’s political goings-on. Some blogs discuss personal experiences.’ Source.

  • Blogging



    Introduction to Blogging « WordPress Codex
    Many blogs focus on a particular topic, such as web design, home staging, sports , or mobile technology. Some are more eclectic, presenting links to all types of ...
    codex.wordpress.org/Introduction_to_Blogging

  • Viral Video


    Viral videos : Flowplayer
    Features and benefits. Embed code for embedding the video. Video link for emailing to friends. Video link sharing to Facebook, Myspace, Twitter, Bebo, Orkut, ...
    flowplayer.org/plugins/flash/viralvideos.html

  • Viral Video

    The behaviors behind viral videos, where ideas and news spread between individuals through dialogue, have been present in society since prehistoric times and form part of the foundation of culture.[citation needed] These behaviours are studied by the sociological fields of memetics and semiotics. Word of mouth marketing has long exploited the credibility of personal recommendations, and viral videos also benefit from this effect.
    Viral videos began circulating before the major video sharing sites such as YouTube, Funny or Die and CollegeHumor, by e-mail sharing. One of these early videos was "The Spirit of Christmas" which surfaced in 1995.[11] In 1996 "Dancing Baby" appeared.[11][12] This video was released as samples of 3D character animation software. Ron Lussier, the animator who cleaned up the raw animation, began passing the video around LucasArts, his workplace at the time.[13] A particularly well-known early example was "All your base are belong to us," based on a poorly translated video game, which was first distributed as a GIF animation and became popular in the year 2000.[14]
    Viral videos' staying power relies on hooks which draw the audience to watch them. The hooks are able to become a part of the viral video culture after being shown repeatedly. The hooks, or key signifiers, are not able to be predicted before the videos become viral.[15]
    More recently, there has been a surge in viral videos on video sharing sites such as YouTube, partially because of the availability of affordable digital cameras.[16]

  • Copyright

    Welcome to the Copyright Website, the ultimate copyright portal for real world, practical copyright information. Launched on May Day 1995, the Copyright Website strives to lubricate the machinations of information delivery. As spice is to Dune, information is to the Web; the spice must flow.

    Specialized information for webmasters, musicians, moviemakers, screenwriters, programmers and photographers.
    General copyright information for educators, students, web-surfers, re-mixers, mash-uppers and confused citizens.

  • Copyright

    Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.[clarification needed][1]
    Copyright initially was conceived as a way for government to restrict printing; the contemporary intent of copyright is to promote the creation of new works by giving authors control of and profit from them. Copyrights are said to be territorial, which means that they do not extend beyond the territory of a specific state unless that state is a party to an international agreement. Today, however, this is less relevant since most countries are parties to at least one such agreement. While many aspects of national copyright laws have been standardized through international copyright agreements, copyright laws of most countries have some unique features.[2] Typically, the duration of copyright is the whole life of the creator plus fifty to a hundred years from the creator's death, or a finite period for anonymous or corporate creations. Some jurisdictions have required formalities to establishing copyright, but most recognize copyright in any completed work, without formal registration. Generally, copyright is enforced as a civil matter, though some jurisdictions do apply criminal sanctions.

  • Databases




    Online Database
    Believe it or not, many businesses still rely on generic, out-of-the-box software like Excel, MS Access or FileMaker. TrackVia breaks away from the crowd by offering the ease of a spreadsheet with all the power of an online relational database to help track and manage your work better, faster, and easier.
    Read more

  • Databases

    A database is an organized collection of data. The data is typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies).
    A general-purpose database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle, Sybase, dBASE, FoxPro, and IBM DB2. A database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database.

  • Moral Literarcy

    Book Description
    Publication Date: September 15, 2008 | ISBN-10: 0674030524 | ISBN-13: 978-0674030527
    A distinguished moral philosopher and a leading interpreter of Kant's ethics, Barbara Herman draws on Kant to address timeless issues in ethical theory as well as ones arising from current moral problems, such as obligations to distant need, the history of slavery as it bears on affirmative action, and the moral costs of reparative justice.

    Challenging various Kantian orthodoxies, Herman offers a view of moral competency as a complex achievement, governed by rational norms and dependent on supportive social conditions. She argues that the objectivity of duties and obligations does not rule out the possibility of or need for moral invention. Her goal is not to revise Kant but to explore the issues and ask the questions that he did not consider.

    Some of the essays involve explicit interpretation of Kant, and others are prompted by ground-level questions. For example, how should we think about moral character given what we know about the fault lines in normal development? If ordinary moral life is saturated by the content of local institutions, how should our accounts of moral obligation and judgment accommodate this?

  • Moral Literarcy

    Emerald Group Publishing Limited
    Abstract:
    Purpose – The purpose of this paper is to provide a framework for conceptualizing three dispositional-related stages that educators may experience in their professional careers and address the implications of these stages for integrating moral literacy perspectives into initial and advanced teacher and leader certification programs.

    Design/methodology/approach – The dispositional conceptual framework is presented and discussed from the author's viewpoint. The contention is that there is at least some general consistency that teacher and leader program candidates, at various stages of their professional careers, may experience and reflect in the attitudes – a component of dispositions – that they bring to the university classroom learning environment.

    Findings – Observations and insights about the consistency of dispositions within each of three program candidate groups are discussed. The dispositions emerged as: attitude formation; attitude adjustment; and attitude alignment. Within the context of course development and through that process of course delivery, the author describes how an understanding of candidates' attitudinal stages informed decisions about course content and instructional strategies to facilitate an ethos of values inquiry and reflection.

    Originality/value – The framework may be useful to professors of education interested in integrating values inquiry and moral agency into their teaching.

  • Academic Integrity

    academic integrity | Define academic integrity at Dictionary.com
    dictionary.reference.com/browse/academic integrity
    The world's most popular free online dictionary with definitions, spell check, word origins, example sentences, audio pronunciations, Word of the Day and more!

  • Academic Intergrity

    Popular Q&A
    Q: What does academic integrity mean?
    A: Academic integrity means honesty and responsibility in scholarship. This includes v... Read More »
    Source: www.chacha.com
    Q: What does academic integrity mean?
    A: Good students ask more questions. eNotes educators are standing by. Join a community of thousands of dedicated teachers and students. JOIN eNOTES Read More »
    Source: www.enotes.com
    Q: Why is Academic Integrity Important?
    A: Academic integrity is important when applying to different colleges and other educational acadamies. It is what is looked at when searching for admittance. Read More »
    Source: answers.ask.com

  • Collaboration


    collaboration - The Free Dictionary
    col·lab·o·rate (k -l b -r t ). intr.v. col·lab·o·rat·ed, col·lab·o·rat·ing, col·lab·o·rates. 1. To work together, especially in a joint intellectual effort. 2. To cooperate ...
    www.thefreedictionary.com/collaboration

  • Collaboration

    Collaboration
    From Wikipedia, the free encyclopedia
    For other uses, see Collaboration (disambiguation).
    See also: Co-operation; coordination


    collaboration - The Free Dictionary
    col·lab·o·rate (k -l b -r t ). intr.v. col·lab·o·rat·ed, col·lab·o·rat·ing, col·lab·o·rates. 1. To work together, especially in a joint intellectual effort. 2. To cooperate ...
    borationwww.thefreedictionary.com/colla
    Collaboration is working with each other to do a task.[1] It is a recursive[2] process where two or more people or organizations work together to realize shared goals, (this is more than the intersection of common goals seen in co-operative ventures, but a deep, collective, determination to reach an identical objective[by whom?][original research?]) — for example, an intriguing[improper synthesis?] endeavor[3][4] that is creative in nature[5]—by sharing knowledge, learning and building consensus. Most collaboration requires leadership, although the form of leadership can be social within a decentralized and egalitarian group.[6] In particular, teams that work collaboratively can obtain greater resources, recognition and reward when facing competition for finite resources.[7] Collaboration is also present in opposing goals exhibiting the notion of adversarial collaboration, though this is not a common case for using the word.
    Structured methods of collaboration encourage introspection of behavior and communication.[6] These methods specifically aim to increase the success of teams as they engage in collaborative problem solving. Forms, rubrics, charts and graphs are useful in these situations to objectively document personal traits with the goal of improving performance in current and future projects.

  • Privacy(Net)

    Privacy (from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy partially intersects security, including for instance the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity.
    The right not to be subjected to unsanctioned invasion of privacy by the government, corporations or individuals is part of many countries' privacy laws, and in some cases, constitutions. Almost all countries have laws which in some way limit privacy; an example of this would be law concerning taxation, which normally require the sharing of information about personal income or earnings. In some countries individual privacy may conflict with freedom of speech laws and some laws may require public disclosure of information which would be considered private in other countries and cultures. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships. Academics who are economists, evolutionary theorists, and research psychologists describe revealing privacy as a 'voluntary sacrifice', for instance by willing participants in sweepstakes or competitions. In the business world, a person may volunteer personal details (often for advertising purposes) in order to gamble on winning a prize. Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft.

  • Privacy (Net)

    www.CancerCenter.com
    pri·va·cy noun \ˈprī-və-sē, especially British ˈpri-\
    plural pri·va·cies

    Definition of PRIVACY

    1
    a : the quality or state of being apart from company or observation : seclusion
    b : freedom from unauthorized intrusion <one's right to privacy>
    2
    archaic : a place of seclusion
    3
    a : secrecy
    b : a private matter : secret
    See privacy defined for English-language learners »
    See privacy defined for kids »
    Examples of PRIVACY

    She went upstairs for some privacy.
    Celebrities have a right to privacy.
    First Known Use of PRIVACY

    15th century
    Related to PRIVACY

    Synonyms
    aloneness, insulation, isolation, secludedness, seclusion, segregation, separateness, sequestration, solitariness, solitude
    Related Words
    loneliness, lonesomeness; vacuum; confinement, incarceration, internment, quarantine; retirement, withdrawal; ghettoization
    Near Antonyms
    camaraderie, companionship, company, comradeship, fellowship, society
    more
    Learn More About PRIVACY

    Thesaurus: All synonyms and antonyms for "privacy"
    Spanish-English Dictionary: Translation of "privacy"
    Browse

    Next Word in the Dictionary: privado
    Previous Word in the Dictionary: priv
    All Words Near: privacy
    Seen & Heard

    What made you want to look up privacy? Please tell us where you read or heard it (including the quote, if possible).

  • Malware

    Defining Malware: FAQ

    85 out of 115 rated this helpful - Rate this topic
    Published: October 1, 2003
    By Robert Moir, Security MVP

    Abstract
    This document is a compilation of Frequently Asked Questions (FAQ) regarding "malware," a general term coined for all forms malicious software.
    Questions about Malware
    Q: What are malware, viruses, spyware, and cookies, and what differentiates them?
    A: Let us take the easy one first. "Malware" is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al.
    Q. What exactly is a virus? Is a "worm" also a virus?
    Viruses are computer programs or scripts that attempt to spread from one file to another on a single computer and/or from one computer to another, using a variety of methods, without the knowledge and consent of the computer user. A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer’s memory.
    Many users define viruses simply as trick programs designed to delete or move hard drive data, which, strictly speaking, is not correct. From a technical viewpoint, what makes a virus a virus is that it spreads itself. The damage it does is often incidental when making a diagnosis.
    Obviously, any incidental damage is important, even when authors do not intend to create problems with their viruses; they can still cause harm unintentionally because the author did not anticipate the full effect or unintentional side effects. The most common method used for spreading a virus is through e-mail attachment. Sending a virus, even if designed to be harmless, can cause unforeseen damage.
    Q. How can I prevent a virus from infecting my computer?
    A virus scanner is the most common tool for prevention. This utility attempts to scan a computer program before it runs, and if it recognizes the signature of a malicious code, it shuts it down. Many scanners also evaluate programs to determine if it contains any virus-related characteristics.
    The best way to stop viruses is to use common sense. If an executable computer program is attached to your e-mail and you are unsure of the source, then it should be deleted immediately. Do not download any applications or executable files from unknown sources, and be careful when trading files with other users.
    Q. What is a "Trojan Horse"? Isn't this a virus by any other name?
    I have heard some arguments that Trojan Horse malware is a virus subset (and vice versa) but there are differences worth mentioning.
    A Trojan Horse meets the definition of virus that most people use, in the sense that it attempts to infiltrate a computer without the user’s knowledge or consent. A Trojan Horse, similar to its Greek mythological counterpart, often presents itself as one form while it is actually another. A recent example of malware acting as a Trojan horse is the recent e-mail version of the "Swen" virus, which falsely claimed to be a Microsoft update application.
    Trojans typically do one of two things: they either destroy or modify data the moment they launch, such as erase a hard drive, or they attempt to ferret out and steal passwords, credit card numbers, and other such confidential information.
    Trojan Horses can be a bigger problem than other types of viruses as they are design to be destructive or disruptive, as opposed to viruses and worms where the coder may not intend to do any harm at all. Essentially this distinction does not matter in the real world. You can lump viruses, Trojans, and worms together as "things I don't want on my computer or my network".
    Q. How do I prevent a Trojan Horse attack?
    The methods for dealing with Trojans are generally the same as for those for dealing with viruses. Most virus scanners attempt to deal with some of the common Trojans with varying degrees of success. There are also specific "anti-Trojan" scanners available, and your best weapon is common sense yet again. Score another point for safe computing!
    Q. What are cookies and spyware? How are they different?
    A cookie is just a bit of text in a file on your computer, containing a small amount of information that identifies you to a particular website, and whatever information that site wanted to retain about the user when they are visiting.
    Cookies are a legitimate tool used by many websites to track visitor information. As an example, I might go to an online computer store and place an item in the basket, but decide not to buy it right away because I want to compare prices. The store can choose to put the information about what products I put into my basket in a cookie stored on my computer. This is an example of a good use of cookies to help the user experience.
    The only websites that are supposed to be able to retrieve the information stored in a cookie are the websites that wrote the information in that particular cookie. This should ensure your privacy by stopping anyone other than the site you are visiting from being able to read any cookies left by that site.
    Q. Do some websites use cookies to exploit user information?
    A. Unfortunately, yes. Some may deceive users or omit their policies. For example, they may track your Web surfing habits across many different websites without informing you, and then use this data to customize the advertisements you see on websites, etc., typically considered as an invasion of privacy.
    It is difficult to identify this and other forms of "cookie abuse," which makes it difficult to decide if, when, and how to block them from ones system. In addition, the acceptable level of shared information varies between users, so it is difficult to create an "anti-cookie" program to meet the needs of everyone.
    Q. How does spyware exploit user information?
    The spyware problem is similar to the cookie problem from the point of view that both are an invasion of privacy, although spyware is different from cookies, technically speaking. Spyware is a program that runs on your computer and, again, tracks your habits and tailors these patterns for advertisements, etc. Because it is a computer program rather than just a bit of text in a cookie, spyware can also do some nasty things to ensure that the spyware keeps running and keeps influencing what you see.
    Q. How do I know if spyware is running on my computer?
    You can use detection programs such as Ad Aware and others. Similar to antivirus software, these programs compare a list of known spyware with files on your computer and can remove any that it detects. But again, what some consider unacceptable is perfectly acceptable to others.
    Q. How does spyware install itself on computers?
    Common tactics for surreptitious installation include rolling up advertising programs into "free" shareware program downloads, and once the spyware is installed it can download advertisements 24 hours a day and overlay them on websites and programs you are using. Anti-spyware programs can combat spyware from being installed, but the best strategy is to discriminate what you choose to download and install.
    Q. Can spyware send tracked information to other people?
    Some forms of spyware monitor a target’s Web use or even general computer use and sends this information back to the spyware program's authors for use as they see fit. To fight this kind of problem, a spyware removal tool is obviously helpful, as is a firewall that monitors outgoing connections from your computer. Other forms of spyware take over parts of your Web browsing interface, forcing you to use their own search engines, where they can track your browsing habits and send pop-up advertisements to you at will.
    The biggest concern regarding spyware is that most of them are poorly written or designed. Many people first realize their computer is running spyware when it noticeably slows down or stops responding, especially when doing certain tasks such as browsing websites or retrieving e-mail. In addition, poorly written spyware can often cause your computer to function incorrectly even after it has been removed.
    Q. Do you have a quick summary of how to prevent malware problems?
    A: Yes — see below.
    Two of the biggest concerns for computer users today are viruses and spyware. In both cases, we have seen that while these can be a problem, you can defend yourself against them easily enough with just a little bit of planning:
    Keep your computer’s software patched and current. Both your operating system and your anti- virus application must be updated on a regular basis.
    Only download updates from reputable sources. For Windows operating systems, always go to http://update.microsoft.com/microsoftupdate/ and for other software always use the legitimate websites of the company or person who produces it.
    Always think before you install something, weigh the risks and benefits, and be aware of the fine print. Does the lengthy license agreement that you don’t want to read conceal a warning that you are about to install spyware?
    Install and use a firewall. If you are running Windows XP you can use the built-in software firewall under Control Panel, and there are free versions of firewalls that work on all versions of Windows.
    Prevention is always better than cure.

  • Malware

    Malware
    From Wikipedia, the free encyclopedia


    Beast, a Windows-based backdoor Trojan horse.
    Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.[1] 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.[2]
    Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses.[3] In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states.[4][5] Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics.[6]
    Softwares such as anti virus, anti-malware, and firewalls are relied upon by users at home, small and large organisations around the globe to safeguard against malware attacks which helps in identifying and preventing the further spread of malware in the network.

  • Geo Technology


    1. geotechnology
    Share on twitter Share on facebook Share on more
    1 up, 2 down
    another term for geotechnical engineering (a branch of civil engineering that is concerned with construction in or on the ground. It deals with the study of subsurface conditions and materials through soil and rock mechanics, of the stability of slopes, of earthworks and foundations, etc.).
    Geotechnology is important in road building.
    buy geotechnology mugs & shirts

  • Geo Technology


    Urban Dictionary: geotechnology
    another term for geotechnical engineering (a branch of civil engineering that is concerned with construction in or on the ground. It deals with the...
    www.urbandictionary.com/define.php?term=geotechnology

  • Netiquette Link



    Learn Netiquette | Netiquette Video Training | Grovo
    Learn Netiquette with Grovo video tutorials, glossary terms, downloadable PDFs and advanced certifications.
    www.grovo.com/netiquette

  • Netiquette


    Netiquette
    Netiquette is the culture of the internet and the rules of netiquette are the social code. It is a cyber word synonymous with internet etiquette and digital manners ...
    www.networketiquette.net/

  • Disinformation Notes

    Noun
    disinformation (usually uncountable; plural disinformations)
    The dissemination of intentionally false information to deliberately confuse or mislead.
    [edit]Translations
    [show ▼]dissemination of intentionally false information
    [edit]See also
    misinformation
    propaganda
    [edit]References
    ^ http://www.etymonline.com/index.php?search=disinformation
    Categories: English terms derived from RussianEnglish terms derived from FrenchEnglish nouns

  • Disinformation

    dis·in·for·ma·tion (ds-nfr-mshn)
    n.
    1. Deliberately misleading information announced publicly or leaked by a government or especially by an intelligence agency in order to influence public opinion or the government in another nation: "He would be the unconscious channel for a piece of disinformation aimed at another country's intelligence service" (Ken Follett).
    2. Dissemination of such misleading information.
    [Possibly translation of Russian dezinformatsiya.]
    The American Heritage® Dictionary of the English Language, Fourth Edition copyright ©2000 by Houghton Mifflin Company. Updated in 2009. Published by Houghton Mifflin Company. All rights reserved.

  • MOOC IMAGE

    http://extras.mnginteractive.com/live/media/site208/2013/0408/20130408_120154_SBS_L_ONLINE-01-RL.jpg

  • MOOC Definition

    A massive open online course (MOOC) is an online course aiming at large-scale interactive participation and open access via the web. In addition to traditional course materials such as videos, readings, and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and TAs. MOOCs are a recent development in distance education and often use open educational resources. Typically they do not offer academic credit or charge tuition fees. Only about 10% of the tens of thousands of students who may sign up complete the course.[1]
    MOOCs originated about 2008 within the open educational resources (or OER) movement. Many of the original courses were based on connectivist theory, emphasizing that learning and knowledge emerge from a network of connections. 2012 became "the year of the MOOC" as several well-financed providers, associated with top universities, emerged, including Coursera, Udacity, and edX.[2]


    Dennis Yang, President of MOOC provider Udemy has suggested that MOOCs are in the midst of a hype cycle, with expectations undergoing a wild swing.[3]
    There are few standard practices or definitions in the field yet. Three other organizations, Khan Academy, Peer-to-Peer University (P2PU) and Udemy are viewed as being similar to MOOCs, but differ from the three above providers in that they work outside the university system or mainly provide individual lessons that students may take at their own pace, rather than having a massive number of students all working on the same course schedule.[4][5] Note, however, that Udacity differs from Coursera and edX in that it does not have a calendar-based schedule; students may start a course at any time.
    Many universities scrambled to join in the "next big thing", as did more established online education service providers such as Blackboard Inc, in what has been called a "stampede." Dozens of universities in Canada, Mexico, Europe and Asia have announced partnerships with the large American MOOC providers.[6][7] Nevertheless, by early 2013, questions emerged about whether MOOCs were undergoing a hype cycle and whether academia was "MOOC'd out."[3][8]
    Features associated with early MOOCs, such as open licensing of content, open structure and learning goals, and connectivism may not be present in all MOOC projects.[9]

  • MOOC



    Massive Open Online Courses Are Multiplying at a Rapid Pace ...
    Nov 2, 2012 ... Massive open online courses are the educational happening of the moment. ... The line between online and on campus is already blurring.
    www.nytimes.com/.../massive-open-online-courses-are-multiplying-at-a-rapid -pace.html?...

  • Digital Immigrant Link

    http://youtu.be/p72mdptb51U

  • Digital Immigrant

    1. Digital Immigrant
    Share on twitter Share on facebook Share on more
    19 up, 2 down
    Someone who was born before the existence of digital technologies and adopted it to some extent later in life.
    Once a digital immigrant, Bob later learned how to use a smart phone.
    buy digital immigrant mugs & shirts
    digital immigrant newbie information age technobust
    by Millard Snipplewitz Sep 6, 2011 add a video

  • Digital Law Link


    Digital Law Online: Foreword
    But because there are only a handful of cases interpreting the changes to the law to address digital material, such as the DMCA, this book also highlights the ...
    digital-law-online.info/lpdi1.0/treatise2.html

  • Digital Law Notes:

    4 Digital Laws
    2011 OCTOBER 12
    tags: Apple, Digital Laws, Innovation, Michio Kaku, Moore's law, Steve Jobs
    by Greg

    We digital folks are a rebellious bunch. We don’t like being told what we can and can’t do. We like to think anything is possible and, sometimes, we even make good on our hubris.

    With each passing year new products come to market that amaze us, not just through technological sophistication, but because they unlock desires and urges that we never knew we had. Alas, we often fail more than we succeed.

    The most successful players fail the most. It’s a part of the price you pay when you set out to innovate. At places like Google, failure is almost a religion. Yet there is smart failure and stupid failure. Smart failure happens when you trek out into the unknown. Stupid failure happens when you ignore the rules. These four are the most important ones.


    1. Kryder’s Law
    The first piece of digital legislation is called Kryder’s law and was first noted in this 2005 Scientific American article. The basic idea is that storage capacity doubles every twelve months. Here’s what it looks like:





    When the Apple II launched in the late 70’s, it had barely 100 kilobytes of memory and cost between $1000 and $2000. You could get more memory, but a 10 megabyte disc would cost about $5000, more than the computer itself! Today, you can buy a terabyte, enough to store roughly a thousand full length movies, for less than $100.

    The result has been that we generally don’t care very much about disk space anymore. We no longer delete e-mails with attachments to free up space and there are plenty of companies that will let us store gigabytes of data, or tens of thousands of times the capacity of the original Apple II, for free online.

    Of all the digital laws, Kryder’s law is the easiest to abide by, because it is such a slack law. However, every one in a while, something comes along that will stretch it’s limits. The last was digital video. The next will most likely be holograms.

    2. Moore’s Law
    You’ve probably heard of Moore’s law, which is our oldest and most famous guiding principle. It was first identified in 1965 by Intel co-founder Gordon Moore, who made it the guiding light for his company. Come hell or high water, he knew that they would have to double the processing speed of their chips every eighteen months to two years.

    It looks like Kryder’s law but actually runs about 50% slower.



    Early on in the digital age, processing speed was the major problem. Our computers weren’t fast enough to do perform basic tasks and rapid improvement in this area determined overall performance. It was the first thing we would ask about when we went to buy a computer.

    That’s changed, of course. Now chips are so powerful that an everyday mobile phone is far more powerful than the computers that sent a man to the moon. We care much more about portability and price than we do about processing speed.

    Nevertheless, there are some important issues regarding Moore’s law. Firstly, because of Kyrder’s law, storage capacity is growing faster than processing speed and we are entering a new era of Big Data, where enterprises store massive amounts of information and even ultra-fast chips have trouble processing it, so we need clever algorithms for data mining.

    Secondly, what’s driven Moore’s law is our ability to make transistors smaller so that we can cram more and more onto a silicon wafer. However, there are limits. We can’t make transistors smaller than a single atom. As I explained in an earlier post, we’ll hit that limit around 2020 at which time we’ll have to make the leap to quantum computing.

    3. Nielsen’s Law
    While we have as much storage as we need and the power to process all that data quickly and cheaply, accessing it is still a problem. Nielsen’s law estimates that bandwidth doubles every twenty-one months, so this last component of digital experience lags behind both storage and processing speed.

    Many online resources are slow to load on mobile devices. Anybody who tries to watch video online is acutely aware of the limits to bandwidth and, as we are entering a mobile era of post-PC computing, increasing bandwidth is key to user experience.

    One reason that mobile apps are so popular is that they store a lot of information on the device and are therefore less dependent on a constant connection to the cloud. It’s no wonder that mobile phone operator’s are marketing their new super-fast 4G services so intensively right now.

    New bandwidth standards are expensive to implement. They require new licenses, infrastructure and so on. So improvements come to market not every 21 months, but mostly in huge shifts in user experience at longer intervals. 4G will make a big difference but its effect will erode away as storage and processing speeds outpace it.

    Expect 5G around 2020 and 6G to come along about ten years after that.

    4. The Caveman Law
    The first three digital laws determine what our technology can do, but say nothing about what we want it to do. That brings us to perhaps the most important and most subtle principle of the digital age. Michio Kaku calls it the “Caveman law” and it can be stated as follows:

    Whenever there is a conflict between modern technology and the desires or our primitive ancestors, these primitive desires win each time.

    Caveman law infringements come with the harshest penalties. If you attempt to defy one of the first three laws, you’ll probably never get your product out of the lab. However, Caveman law violations can easily come to market and often do. Often, it is only after investors have lost their shirts is it clear that a breach has occurred.

    The Caveman law is also my favorite piece of digital legislation. It represents our greatest assurance that our technology will remain our own. Products that comply with the Caveman law delight us, become wildly successful and spur more innovations along a similar path.

    The Genius of Steve Jobs

    Many people admire Steve Jobs for breaking the rules. However, it should be clear that while he flouted business conventions, he adhered strictly to the digital laws. He never rushed into new markets, but waited patiently for capabilities to catch up with concepts. When they did, he sprung into action.

    Furthermore, while he tolerated Kryder’s, Moore’s and Nielsen’s laws, he revered the Caveman law. It was, for him, the one to rule them all. While other technology companies touted their products’ features, Apple focused on the experience and the deep desires that their creations would unlock.

    That, as we all know now, made all the difference in the world.

    When he passed away last week, we lost a true genius. Lots of smart people can do all sorts of complex things. It takes a person of special talent to never lose sight of simple ones, when everyone around you, competitors, co-workers, business journalists and all the rest, want only to muddy the waters.

    Even in dreams, there are laws.

  • Apr 14, 13

    A digital native is a person who was born during or after the general introduction of digital technologies and through interacting with digital technology from an early age, has a greater understanding of its concepts. Alternatively, this term can describe people born during or after 1960s, as the Digital Age began at that time; but in most cases, the term focuses on people who grew up with the technology that became prevalent in the latter part of the 20th century and continues to evolve today.
    Other discourse identifies a digital native as a person who understands the value of digital technology and uses this to seek out opportunities for implementing it with a view to make an impact.
    This term has been used in several different contexts, such as education (Bennett, Maton & Kervin 2008), higher education (Jones & Shao 2011) and in association with the term New Millennium Learners (OECD 2008). A digital immigrant is an individual who was born before the existence of digital technology and adopted it to some extent later in life.

  • Digital Citizenship Means Responsible Use

    learntech.ties.k12.mn.us › ... › Cara Hagen › Digital Citizenship - Cached

    Digital Citizenship definition - Digital Citizenship

    digitalciti.weebly.com/digital-citizenship-definition.html - Cached

    Learn the Ropes on Digital Citizenship - Digital Citizenship

    learn-the-ropes.wikispaces.com/Digital+Citizenship - Cached

    Define: Digital Citizen, Digital Citizenship, Digital Footprint, Digital World, etc. As you travel the waters of the Internet, from the trickles over ...

  •  Source : University of Illinos at Urbana Champaign , University Library.

    "Uncover and Discover"

     

    Tutorials

    Videos

    Podcasts

    Database Linking

    Learning Objects

    Faculty Resources

    News

    Additional Assistance

    LEARN to Use the Library

    General Library Help

    Subject Area Help (LibGuides)

    Information Literacy

    Database Tutorials

     

    Library » Digital Literacy Home » Digital Literacy Definition

    Digital Literacy Definition and Resources

     

    What is Digital Literacy?

    The ability to use digital technology, communication tools or networks to locate, evaluate, use and create information. 1

    The ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers. 2

    A person’s ability to perform tasks effectively in a digital environment... Literacy includes the ability to read and interpret media, to reproduce data and images through digital manipulation, and to evaluate and apply new knowledge gained from digital environments. 3

     

     

     

    Better defining digital literacy - Knight Foundation

    www.knightfoundation.org/blogs/.../better-defining-digital-literacy/ - Cached
     
    <img class="vsi" style="border-style: none; width: 400px; display: block; height: auto;" src="data:image/jpeg;base64,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
1 - 20 of 35 Next ›
20 items/page
List Comments (0)