Look Up From Your Phone - You're missing Life (or are you?) http://youtu.be/Z7dLU6fk9QY Look Up' - A spoken word film for an online generation.
'Look Up' is a lesson taught to us through a love story, in a world where we continue to find ways to make it easier for us to connect with one another, but always results in us spending more time alone.
and the Parody...
The Darker Side of Future Technology http://youtu.be/JbQeABIoO6A Next Future Surveillance Technology - No One Escape (Full Documentary)
Napster For Pirated 3D Printing Templates? http://techcrunch.com/2013/05/04/3d-printing-piracy-physibles/ Napster For Pirated 3D Printing Templates?
Buy it in a store, laser-scan it at home, upload it to the web, print it anywhere. 3D printing is poised for the mainstream, but what happens when one person’s finely hand-crafted designs can be pirated and reproduced by anyone?
Will 3D-printing-piracy social networks arise? And how will manufacturers lobby to stop them?
Technology that Will Disrupt the Future http://bit.ly/1hivTxT Tech that Will Disrupt the Future
Are “transhumans” the future of mankind?
The Future of Silicon Valley
TPB-AFK The Pirate Bay : Away from Keyboard #documentary http://watch.tpbafk.tv/ TPB-AFK The Pirate Bay : Away from Keyboard - The Film #documentary
It’s the day before the trial starts. Fredrik packs a computer into a rusty old Volvo. Along with his Pirate Bay co-founders, he faces $13 million in damage claims to Hollywood in a copyright infringement case. Fredrik is on his way to install a new computer in the secret server hall. This is where the world’s largest file sharing site is hidden.
When the hacker prodigy Gottfrid, the internet activist Peter and the network nerd Fredrik are found guilty, they are confronted with the reality of life offline – away from keyboard. But deep down in dark data centres, clandestine computers quietly continue to duplicate files.
Follow Pirate Bay on Twitter DOWNLOAD TORRENT ... note that the adverts that may appear at this link will probably not be student friendly!
Reality (data) mining http://en.wikipedia.org/wiki/Reality_mining Reality (data) mining
Reality mining is the collection and analysis of machine-sensed environmental data pertaining to human social behavior, with the goal of identifying predictable patterns of behavior. It was declared to be one of the "10 technologies most likely to change the way we live" by Technology Review Magazine.
e.g collecting data for for smart phone and using it for social engineering ... to make your life .. easier and more healthy.
Reality mining studies human interactions based on the usage of wireless devices such as mobile phones and GPS systems providing a more accurate picture of what people do, where they go, and with whom they communicate with rather than from more subjective sources such as a person's own account.
Reality mining is one aspect of digital footprint analysis.
Should Mobile Phone cases be allowed in schools? http://www.yellowjacketcase.com/ The debate in many schools is still going on regarding students bringing their mobile phones into school for teaching and learning.
I wonder how many schools have included smart phone cases in their policies
What stirred me to mention this in particular
is the "Yellow Jacket case stun gun in your favorite color."
I've even been informed there is an iPhone case that delivers pepper spray ... what next?
'One Second To The Next' Documentary - It Can Wait http://youtu.be/_BqFkRwdFZ0 Dangers of Driving and Texting
Xzavier, Chandler, Debbie, and Reggie all know the horrors of texting & driving firsthand. Watch their stories in this It Can Wait Documentary.
Visit www.itcanwait.com to take the pledge, and learn more about the dangers of texting while driving
World's First Entirely 3D-Printed Gun http://onforb.es/ZuDxZs World's First Entirely 3D-Printed Gun
All sixteen pieces of the Liberator prototype were printed in ABS plastic with a Dimension SST printer from 3D printing company Stratasys, with the exception of a single nail that’s used as a firing pin. The gun is designed to fire standard handgun rounds, using interchangeable barrels for different calibers of ammunition.
Technically, Defense Distributed’s gun has one other non-printed component: the group added a six ounce chunk of steel into the body to make it detectable by metal detectors in order to comply with the Undetectable Firearms Act. In March, the group also obtained a federal firearms license, making it a legal gun manufacturer.
McCann Mobile Personality Profiler http://www.truthprofiler.com/ McCann Mobile Personality Profiler
The questions asked in this profiler are excellent to focus discussion on the use of mobile phones.
What sort of mobile user are you?.
Know Your Meme: Internet Meme Database http://knowyourmeme.com/ Know Your Meme: Internet Meme Database
Know Your Meme is a website dedicated to documenting Internet phenomena: viral videos, image macros, catchphrases, web celebs and more.
Moral education enhanced by internet in IT courses http://bit.ly/Xm1GiP Moral education enhanced by internet in IT courses
Choosing appropriate topics for moral discussion.
Will Robots Take Your Job? http://nyr.kr/WcOzzT Will Robots Take Your Job?
Slowly, but surely, robots (and virtual ’bots that exist only as software) are taking over our jobs; according to one back-of-the-envelope projection, in ninety years “70 percent of today’s occupations will likewise be replaced by automation.” Should we be worried?
econsumer.gov http://www.econsumer.gov In April of 2001, responding to the challenges of multinational Internet fraud, and working to enhance consumer protection and consumer confidence in e-commerce, 13 countries unveiled econsumer.gov, a joint effort to gather and share cross-border e-commerce complaints.
Today, consumer protection agencies in 28 countries participate in this initiative.
The project has two components: a multilingual public website, and a government, password-protected website. The public site allows consumers to lodge cross-border complaints, and to try to resolve their complaints through means other than formal legal action.
Wearable Tech: Welcome to the Future of Fashion http://mashable.com/2012/05/23/wearable-tech-infographic Wearable Tech: Welcome to the Future of Fashion
This infographic, provided by Visual.ly and VoucherCodes.co.uk, takes a look at the most up-and-coming wearable technology. Some of these products have already hit the market, and others are projected to in the near future.
Take a look at some of the trending wearable tech accessories.
Will you be spending your money on any of these gadgets?
Collusion : Tracking the trackers http://www.mozilla.org/en-US/collusion/ Tracking the trackers: Mozilla's anti-Big Brother add-on
Collusion is an experimental add-on for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers.
The Web's New Gold Mine: Your Secrets http://on.wsj.com/ym3qzi The Web's New Gold Mine: Your Secrets
Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
How The CIA Uses Social Media http://bit.ly/s6FhFr How The CIA Uses Social Media to Track How People Feel
In a nondescript building in Virginia(USA), analysts are tracking millions of tweets, blog posts, and Facebook updates from around the world
Meme Memes http://thedailymeme.com/what-is-a-meme/ What is a Meme
The term and concept of meme is from the 1976 book by Richard Dawkins, The Selfish Gene.
Though Dawkins defined the meme as “a unit of cultural transmission, or a unit of imitation,” memeticists vary in their definitions of meme. The lack of a consistent, rigorous definition of what precisely a meme is remains one of the principal criticisms leveled at memetics, the study of memes.
By some other definitions memes are viral and propagate around sometimes mutating as they propagate. Someone proposed something along the lines of some blog posts are viral, they write about something they see on one blog and the next person does the same sometimes their interpretation varies slightly changing the story
How Egyptians Used Twitter http://mashable.com/2011/02/01/egypt-twitter-infographic/ How Egyptians Used Twitter During the January 2011 Crisis [INFOGRAPHIC]
Social media intelligence firm Sysomos has analyzed a lot of the Egypt-related tweets and mined them for important cues, such as keywords and location data, that might show us just how news and information about Egypt are being disseminated via social media.
Phishing Scams in Plain English http://www.commoncraft.com/phishing Phishing Scams in Plain English ... video
"Phishing Scams in Plain English is designed to increase awareness of phishing scams and help viewers recognize and avoid phishing emails when they see them. The video includes:
-An example of how the scam typically works
-How to recognize and report a phishing email
-What to do when you receive a phishing email
-What to do if you mistakenly divulge information"
Growing Up Online http://www.pbs.org/wgbh/pages/frontline/kidsonline/ Growing Up Online
In Growing Up Online, FRONTLINE (pbs) takes viewers inside the very public private worlds that kids are creating online, raising important questions about how the Internet is transforming childhood.
"The Internet and the digital world was something that belonged to adults, and now it's something that really is the province of teenagers, " says C.J. Pascoe, a postdoctoral scholar with the University of California, Berkeley's Digital Youth Research project.
At school, teachers are trying to figure out how to reach a generation that no longer reads books or newspapers.
"We can't possibly expect the learner of today to be engrossed by someone who speaks in a monotone voice with a piece of chalk in their hand," one school principal says.
"You have a generation faced with a society with fundamentally different properties, thanks to the Internet," says Danah Boyd, a fellow at Harvard's Berkman Center for Internet & Society.
"It's a question for us of how we teach ourselves and our children to live in a society where these properties are fundamentally a way of life. This is public life today."
Watch the complete program(me) online.
Internet in Britain 2007 http://tinyurl.com/3cu6sn Internet in Britain 2007 – survey shows digital divide still to be bridged
Free ICT Courses from the Open University (UK http://openlearn.open.ac.uk/course/category.php?id=7 Free ICT Course materials from the Open University (UK)
T175_8 ICT's: information | T175_5 Working with ICTs: e-government | T175_4 Study skills for ICTs | T175_3 Introducing ICT Systems | T175_2 ICTs in everyday life | T175_1 ICTs: device to device communication | T171_1 Computers: bits & bytes | M885_1 Software development for enterprise systems | M882_1 Maintaining and Evolving Software | M150_1 Crossing the boundary - analogue universe, digital worlds | T180_3 Living with the Internet: Online Shopping | T180_5 Information on the web | T180_8 Living with the internet: keeping it safe |
Technology Review online video documentaries http://www.techreview.com/video/ Technology Review online video documentaries
One Laptop per Child | Music-Making For All | Evolutionary Design | Global Warming | Smarter Prosthetics | Stem Cell Research | High-Throughput Drug Discovery | Artificial Muscle | Nanogates | Sociometrics |
From advances in stem-cell research and developments in nanotechnology to potential solutions for global warming, Technology Review brings the impact of emerging technologies to life with an original mini-documentary series.
These unique videos allow you to actually see how the technologies work and hear from the innovators who are creating them.
Goals of an Ethics Policy http://noodletools.com/debbie/ethical/policytemplate.html Goals of an Ethics Policy
An ethics policy explains your [school, library, technology, classroom] goals, values and program within the larger context of the [district, school] educational mission, policies and procedures.
By stating the rules and identifying the norms as lived in daily practices, the ethics policy offers explicit guidance about an individual's behavior and clarifies the rights and responsibilities of the institution and its stakeholders, the community and its members, the classroom and its learners.
The World is Flat http://mitworld.mit.edu/video/266 The World is Flat
Video online of lecture from Tom Friedman (N Y Times)
Chances are good that Bhavya in Bangalore will read your next x-ray, or as Thomas Friedman learned first hand, Grandma Betty in her bathrobe will make your Jet Blue plane reservation from her Salt Lake City home.
In Globalization 3.0, Friedman contends, people from far-flung places will become principal players in the marketplace.
Rise in public sector PC misuse (UK) http://news.bbc.co.uk/2/hi/technology/4076528.stm Rise in public sector PC misuse (UK)
Computer fraud and abuse is on the rise in the public sector, a report by the public watchdog, the Audit Commission, has found.
The number of computer fraud cases has doubled, up from 8% of cases in 2001 to 16% in 2004.
The Journey Inside http://www.intel.com/content/www/us/en/education/k12/the-journey-inside.html The Journey InsideSM is a collection of 35 interactive, online lessons for students to complete.
The curriculum is divided into six sections:
Introduction to Computers, Circuits and Switches, Digital Information, Microprocessors, The Internet, and Technology and Society.
Many of the lessons include interactive Flash* activities, virtual field trips, and videos demonstrating the ideas discussed. You will also be able to use the other Intel Innovation in Education thinking tools such as Visual Ranking and Seeing Reason to further enhance your students' learning.
Cyber Ethics http://www.cybercrime.gov/rules/lessonplan1.htm Cyber Ethics : A lesson plan for primary and middle schools students.
What is a Computer Crime | Hackers Invade Privacy | Computer "Pirates" Steal Intellectual Property | How Can We Prevent Computer Crime | Code of Responsible Computing |
Technology and Inequality http://www.sciencenetlinks.com/lessons.php?BenchmarkID=3&DocID=348 Technology and Inequality
Purpose : To help students become more familiar with different types of technology, and to understand that not all people have the same access to technology.
In this lesson, students study briefly the history, evolution, and social benefits of the automobile (as a general model for the kinds of technologies that were once enjoyed only by those who could afford them). Though most technologies today are enjoyed by more and more people, students will weigh the reasons why technologies like the automobile, computers, cell phones, and others are not accessed or used equally by all groups of society.
They will recognize that issues like high cost, special training, and limited need contribute to these discrepancies.
The Internet and Education (Pew Reports) http://bit.ly/gDVL1V The Internet and Education (Pew Reports)
An overview of how today's student and parents use the Internet to do research, homework, contact schools and teachers, and also sometimes to cheat.
Teenage Life Online http://www.pewinternet.org/Reports/2001/Teenage-Life-Online.aspx Teenage Life Online: The rise of the instant-message generation and the Internet's impact on friendships and family relationships
About 17 million youth ages 12 through 17 use the Internet.
That represents 73% of those in this age bracket. A study by the Pew Internet & American Life Project reveals that teenagers?use of the Internet plays a major role in their relationships with their friends, their families, and their schools.
Parents and their children often do not agree about the place of the Internet in their home. Many parents say they enforce time limits on their children? use of the Internet, but most teens do not say they have limits.
At times, the role of the Internet at home generates struggles and arguments between parents and teens. Both generations agree that teens know more than their parents about the Internet.