Month: July 2010

OET ????

Who – Office of Educational Technology, Bob Fainter and Jean Merenda

What – course development for web-enhanced, hybrid or online delivery, Mediasite recordings, video recording including editing and conversion, Blackboard assistance, Centra scheduling, research and evaluate new products and resources, i-Webfolio development, blogs, yammer, twitter and face to face!

Where –  give us a location

When – give us a time

Try it! You just might like it!

A few weeks ago I posted a blog with a catchy title Yabber Dabber Do!  The catchy subject line produced a few responses but I don’t know that anyone actually tried the software.  I have joined Yammer and for the most part was reading a lot of postings on the new i Phone and I pad.  Neither of which I have but I followed along anyway.  Then last week someone asked a question about a testing software of which I was familiar with, I responded and a great exchange of ideas took place and the software is being looked at as part of an Blackboard add in (makes test making really easy!)

 

That same day I had a problem with my MacBook Pro so I posted it and got almost instant assistance from someone in the group and solved the problem!

Another day someone asked about some good ECU PowerPoint templates which then produced some really nice templates which I will make available to the College.

So after being involved in some information exchange I thought why  not create a CAHS Yammer group to which all of you will be getting an invite later today.  Try it out, find the templates, and let us know what you are working on!

As you travel during summer break . . .

from MS-ISAC

Secure Your Laptop

Friday, July 02, 2010, 6:00:03 AM

Laptops are increasing in popularity for both business and personal use. The portability of laptops makes them extremely convenient. However, we must also be aware of the security risks from the loss or theft of laptops, and take proper precautions. The potential loss is twofold; the loss of the laptop itself and any personal, private or sensitive information that it may contain.

Laptops can easily be stolen from the locked trunk of a car, at an airport security checkpoint, at an Internet cafe or even from a hotel room. Keep these tips in mind when you travel with your laptop:

  • Secure your laptop when unattended (e.x. attach the laptop with a security cable to something immovable or to a heavy piece of furniture when it is unattended).
  • Don’t store your password with your laptop.
  • Don’t leave your laptop in your car.
  • Don’t store your laptop in checked luggage.
  • Keep track of your laptop when you go through airport screening. Hold onto your laptop until the person in front of you has gone through the metal detector, and watch for your laptop to emerge from the screening equipment.
  • Use tracking software. Consider use of commercial software that reports the location of a stolen laptop once it’s connected to the Internet.
  • Backup your files. Make a backup of your files before every trip. In the event that your laptop is lost or stolen, you will still have a copy of your data.

For more information: