Tutorials on social media A roundup of guides on how to use blogs, Facebook, Twitter & more Here are tutorials our team has created to help show nonprofits, cause organizations, businesses and individuals how to effectively use social media, divided by subject area. For even more, see the Sharing Center, our posts on resources, tools and video interviews. • Social media • Blogs • Facebook • Twitter • Video & multimedia • Fundraising • Mobile • LinkedIn • Google Plus • Pinterest Social media How to build awareness for your campaign Guest post by Mary Joyce March 2013 Tools & tips: Whether you run a nonprofit, a social enterprise or a cause organization, it’s likely that at some point you run up against the barrier we’ve all faced: How do I get the word out about this amazing campaign? Attracting young people to your nonprofit Guest post by Alison Richmond easyfundraising.co.uk March 2013 How to successfully harness your email list for your cause Guest post by Susannah Vila February 2013 Tutorial: Why measure?
Top 10 Must Have Features in O/R Mapping and Code Generator Author: Iqbal M. Khan O/R mapping tools are becoming more popular each day and people are realizing the productivity gain they provide to developers. Yet, many people don't know enough about O/R mapping to consider using these tools and many others are weary of using any code generators (including O/R mapping tools). In this article, I will try to educate you about the various important features that a good O/R mapping tool would provide you and how it can be beneficial to you. What is O/R mapping? If you're developing an object oriented application that requires a relational database, you'll need to develop persistence objects that are modeled against your database design and know how to interact with different tables in the database. An O/R mapping tool connects to your database and reads its schema, then lets you map persistence objects to database tables and views, specify single-row transactional operations, queries, and stored procedure calls as methods to these objects. Conclusion
Personal Finance and Economics Education Online Game for teachers teaching grades 6 through 12 students - Gen i Revolution | Inspirations and Innovations in the world of Education Scalable System Design Patterns Looking back after 2.5 years since my previous post on scalable system design techniques, I've observed an emergence of a set of commonly used design patterns. Here is my attempt to capture and share them. Load Balancer In this model, there is a dispatcher that determines which worker instance will handle the request based on different policies. The application should best be "stateless" so any worker instance can handle the request. This pattern is deployed in almost every medium to large web site setup. Scatter and Gather In this model, the dispatcher multicast the request to all workers of the pool. This pattern is used in Search engines like Yahoo, Google to handle user's keyword search request ... etc. Result Cache In this model, the dispatcher will first lookup if the request has been made before and try to find the previous result to return, in order to save the actual execution. This pattern is commonly used in large enterprise application. Shared Space Pipe and Filter
Federal Reserve Education - Federal Reserve Education Engaging Thinking | Mind Mapping with Mindomo Mind Mapping is a fantastic tool that helps students (and teachers) to visualise thinking in an organised way. Personally, mind maps have helped me to learn a vast amount amount of information without needing to read through pages of endless notes. Mindomo is an online application where users can create, view and share mind maps in their browser. What I really like about Mindomo is that it creates mind maps according to the Buzan structure: A central image with branches and sub branchesAll writing presented on horizontal branchesEach branch and corresponding writing are colour codedImages linked to keywords The program gives you the flexibility to change the visual features, layout, font, colour and theme of the map. I would really like to hear whether or not other educators have had success with this program! ‘New Horizons’ in engaging technologies The New Horizon 2011 report has just been released and is a ‘must’ read for any innovative educator. Key Trends 1.
USA Visitor Visa - Sponsor Documents The following documents need to be sent from the person who is sponsoring his/her relatives (or anyone else such as friends) to visit the United States. Please send these documents to the person whom you are sponsoring. Do not send it to the U.S. Embassy or Consulate. Please send completed and legible documents. Wherever possible, send computer printed or typed documents to avoid any confusion. If you are sponsoring multiple people at the same time (such as both parents), you should send separate I-134 forms for each person. Form I-134, Affidavit of Support Form You will need to show that you can financially support your relatives while they are in the U.S.
Life Happens | Lessons & Worksheets | Life What do your students know about life insurance and how it works? Print and distribute the unit quiz, or have students go to www.scholastic.com/nextgeneration/students to take the interactive version of the quiz and print their answers. Students evaluate the financial standing and future obligations of a couple with two children and determine if their life insurance policy will enable them to meet their future financial needs and goals. Student Activity: Better Safe (PDF) To help them understand the purpose of life insurance, students will brainstorm portraits of fictional characters and then examine their financial obligations to assess how these responsibilities would be met if the character passed away. Student Activity: Who Needs Life Insurance? The Educator’s Guide, which includes tips for implementing the featured lessons and background information on life insurance, can be downloaded by clicking below.
The Super Book of Web Tools for Educators The Super Book of Web Tools for Educators A comprehensive introduction to using technology in all K-12 classrooms. There are teachers around the world who want to use technology in their classrooms, but they’re just not sure where to start. Introduction: pages 2-3 An Administrator's View: pages 4-7 Elementary School: pages 8-25 Middle School: pages 26-35 High School: pages 36-42 ESL/ELL: pages 43-46 Teaching Online: pages 47-50 Connect Via Skype: pages 51-61 Elementary School Blogging: pages 62-65 Alternative Ed Tech: pages 66-68 Social Media for Educators: pages 69-71 Contributors Steven Anderson Adam Bellow Richard Byrne George Couros Larry Ferlazzo Lee Kolbert Patrick Larkin Cory Plough Beth Still Kelly Tenkely Silvia Rosenthal Tolisano
List of unsolved problems in philosophy This is a list of some of the major unsolved problems in philosophy. Clearly, unsolved philosophical problems exist in the lay sense (e.g. "What is the meaning of life?", "Where did we come from?", "What is reality?", etc.). Aesthetics[edit] Essentialism[edit] In art, essentialism is the idea that each medium has its own particular strengths and weaknesses, contingent on its mode of communication. Art objects[edit] This problem originally arose from the practice rather than theory of art. While it is easy to dismiss these assertions, further investigation[who?] Epistemology[edit] Epistemological problems are concerned with the nature, scope and limitations of knowledge. Gettier problem[edit] In 1963, however, Edmund Gettier published an article in the periodical Analysis entitled "Is Justified True Belief Knowledge?" In response to Gettier's article, numerous philosophers have offered modified criteria for "knowledge." Infinite regression[edit] Molyneux problem[edit] Münchhausen trilemma[edit]
TD Bank Virtual Stock Market Game The 25 Worst Passwords of 2011 The annual list of the 25 worst passwords is out, based on actual compromises. After all these years, why are "monkey" and "qwerty" still on this list? Whenever idiotic passwords are discussed, the following story always comes up: five years ago, a group of Slovak hackers breached Slovakia's National Security Bureau (abbreviated NBU), which stores tons of classified information. It was an easy hack. What's even worse? That was five years ago, but bad passwords still abound. Many of the passwords are sequential numbers like "12345" or "654321," while others contained messages like "letmein" and "trustno1". 1. password If you, like me, are rather scatterbrained, perhaps it's time to invest in a password management app which generates unique passwords for you and stores them under one password-protected program. A few months ago a software architect at Microsoft, compiled after the Sony PSN hack, revealed that most of us have three, easy-to-crack passwords.
What the heck are you actually using NoSQL for? It's a truism that we should choose the right tool for the job. Everyone says that. And who can disagree? The problem is this is not helpful advice without being able to answer more specific questions like: What jobs are the tools good at? Will they work on jobs like mine? Is it worth the risk to try something new when all my people know something else and we have a deadline to meet? In the NoSQL space this kind of real-world data is still a bit vague. Let's change that. Here's a list of uses cases I came up with after some trolling of the interwebs. General Use Cases These are the general kinds of reasons people throw around for using NoSQL. Bigness. More Specific Use Cases Managing large streams of non-transactional data: Apache logs, application logs, MySQL logs, clickstreams, etc.Syncing online and offline data. Redis Use Cases Redis is unique in the repertoire as it is a data structure server, with many fascinating use cases that people are excited to share. VoltDB Use Cases OLTP.