background preloader

Education: Visual Ranking Tool: Overview and Benefits

Education: Visual Ranking Tool: Overview and Benefits

Related:  Critical ThinkingWeb MapsSecurityAMTInternet des objets

Bloom's Digital Taxonomy This is the introduction to Bloom's Digital Taxonomy. The different taxonomical levels can be viewed individually via the navigation bar or below this introduction as embedded pages. This is an update to Bloom's Revised Taxonomy which attempts to account for the new behaviours and actions emerging as technology advances and becomes more ubiquitous.

Map Of Online Communities: 2010 vs. 2007 (PICTURES) XKCD's Randall Munroe, who created a popular, just-for-fun, pseudo-scientific Map of Online Communities in 2007, has revamped his previous infographic. The latest edition, called the Updated Map of Online Communities, reflects (among other information) data from spring and summer 2010. "Communities rise and fall," writes Munroe, "and total membership numbers are no longer a good measure of a community's current size and health. This updated map uses size to represent total social activity in a community--that is, how much talking, playing, sharing, or other socializing happens there." The 2010 estimates "are based on the bet numbers I could find, but involved a great deal of guesswork, statistical inference, random sampling, nonrandom sample, a 20,000 cell spreadsheet, emailing, cajoling, tea-leaf reading, goat sacrifices, and gut instinct (i.e. making things up)," Munroe explains.

Scanning the Internet with Nmap (Defcon 16) Tutorial Scanning The Internet With Nmap (Defcon 16) Description: How would you like to scan millions of hosts on the Internet and catalog all the interesting insights? This is exactly what Fyodor, the author of Nmap or Network Mapper did last summer. Thankfully, he then went on to share his finding with the community at Defcon 16 in his talk titled "Nmap: Scanning the Internet". Interestingly, as Fyodor notes in his talk that scanning such a large set of IP addresses did help him in uncovering many bugs in Nmap and also forced him to make enhancements and add new features to make the scanner really fast.

SCS Configurator Command Line Examples Discovery of AMT capabilities ACUConfig.exe SystemDiscovery c:\discovery_file_name.xml /NoRegistry Notes: This example will have the configurator discover the AMT capabilities on your client and record its findings in the file name you supply. It will not record any information in the registry ACUConfig.exe SystemDiscovery /NoFile Notes: This example will tell the Configurator to not create an XML file but instead place the discovery data into the Windows* registry of the vPro client that the configurator is running on.

The Internet of Things What if your iron sent you an email because you left the house in a rush and forgot to unplug it? Or what if your new sweater tweeted when it was ready to be picked up at the dry cleaner? Prepare yourself for the Internet of Things — a not-so distant future in which inanimate objects have online profiles. Instructional Design The Taxonomy Table How to Write Objectives Adapted from A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives. Lorin W. Andersin, David R. Krathwohl; et al. 2001 Addison Wesley Longman. To dispell the confusion between the means and ends of instruction, contemplate these definitions:

The-map-is-the-territory Many people will have heard of the infamous swastika made up of larches that revealed itself every autumn in a forest outside Berlin. The trees, which turned yellow at the end of the year, stood out against the otherwise evergreen pine forest. The 60 sq yd Nazi symbol was only discovered after the fall of the Berlin Wall when the new German unified government ordered aerial surveys of state-owned land. While it may certainly be the most notorious, the German swastika plantation certainly isn’t the first time man has manipulated living trees for his own, often crude, purposes. National Designs Visitors to the Castelluccio region of Italy are usually surprised to see a strangely familiar shape looming from one of the mountains that enclose the vibrant valley.

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL.

Access to the Intel® vPro™ Web UI with Active Directory User IDs In order to access the Web UI of a provisioned Intel vPro system using an Active Directory User ID using Internet Explorer (IE) there are several things to keep in mind. Ensure that the WebUI check box is selected in the Advance section of the SCS Profile. Reapply provisioning if you add it after the system is provisioned.

Related:  The Infographics GalleryThe PearlEducaciónIoT - Internet des ObjetsWeb4Visualization ToolsTHE INTERNET OF THINGS