A few weeks ago I posted a blog with a catchy title Yabber Dabber Do! The catchy subject line produced a few responses but I don’t know that anyone actually tried the software. I have joined Yammer and for the most part was reading a lot of postings on the new i Phone and I pad. Neither of which I have but I followed along anyway. Then last week someone asked a question about a testing software of which I was familiar with, I responded and a great exchange of ideas took place and the software is being looked at as part of an Blackboard add in (makes test making really easy!)
That same day I had a problem with my MacBook Pro so I posted it and got almost instant assistance from someone in the group and solved the problem!
Another day someone asked about some good ECU PowerPoint templates which then produced some really nice templates which I will make available to the College.
So after being involved in some information exchange I thought why not create a CAHS Yammer group to which all of you will be getting an invite later today. Try it out, find the templates, and let us know what you are working on!
Laptops are increasing in popularity for both business and personal use. The portability of laptops makes them extremely convenient. However, we must also be aware of the security risks from the loss or theft of laptops, and take proper precautions. The potential loss is twofold; the loss of the laptop itself and any personal, private or sensitive information that it may contain.
Laptops can easily be stolen from the locked trunk of a car, at an airport security checkpoint, at an Internet cafe or even from a hotel room. Keep these tips in mind when you travel with your laptop:
- Secure your laptop when unattended (e.x. attach the laptop with a security cable to something immovable or to a heavy piece of furniture when it is unattended).
- Don’t store your password with your laptop.
- Don’t leave your laptop in your car.
- Don’t store your laptop in checked luggage.
- Keep track of your laptop when you go through airport screening. Hold onto your laptop until the person in front of you has gone through the metal detector, and watch for your laptop to emerge from the screening equipment.
- Use tracking software. Consider use of commercial software that reports the location of a stolen laptop once it’s connected to the Internet.
- Backup your files. Make a backup of your files before every trip. In the event that your laptop is lost or stolen, you will still have a copy of your data.
For more information:
Social Media – who what when where try this link for a quick intro. Contact our office to explore how to incorporate one of these into your course.
I was recently asked how to convert a PDF file to Word and searched this blog as I remember posting something last year. Found the link and then found another one which works quite well http://www.pdftoword.com/?PHPSESSID=72467b45ed9493f7d2cc8bca6d778207