Tuesday, December 30, 2008

PCs Made From Corn?

Disposing of e-waste from computers and other electronics is rapidly becoming a worldwide problem. Many parts of computers, especially the plastic components, are not readily biodegradable. Environmentally-conscious manufacturers, such as Fujitsu, are exploring renewable resource options for computer components.

At the CES 2008 trade show, Fujitsu unveiled a notebook computer with a case made of a corn-based polymer instead of the usual plastics derived from petroleum products. Fujitsu states that the main component of the case is "polylactic acid, also known as PLA, a resin that comes from the fermentation of the raw biomass from plants. PLA by itself is biodegradable, does not generate dioxin when burnt, or other harmful gases." The video below discusses the notebook.



Discussion Questions for Students:
1) Have you ever bought a computer or electronic device because it was manufactured in an environmentally-friendly fashion? How important was this in your purchase decision?
2) Do you know what environmentally hazardous substances are contained in your current computer? Are any of these present: Lead, mercury, cadmium and brominated flame retardants? Why do these substances pose hazards?
3) Where can you go locally to ensure that your discarded electronic equipment is properly disposed of or recycled? What questions should you ask before handing over your equipment?

You can find plenty of information on the EPA's site.

Monday, December 29, 2008

Bluetooth Security Problems and Solutions

Most of our students have cell phones, and many of them also have Bluetooth devices, such as wireless headsets. However, most people don’t realize that Bluetooth transmissions are not a secure technology. In this video, Joshua Wright (an instructor at the SANS Institute) shows us how easy it is to listen in on a Bluetooth device and even inject your own audio into the device you’ve compromised.



Although requiring technical skills beyond the casual computer user (as it involves using Linux and other seemingly arcane protocols), a computer science student would probably have no trouble in replicating these actions. In fact, there are many web sites that list Bluetooth hacking tools with links to download them. Fortunately there are simple ways to protect yourself from Bluetooth snooping, and one of the best resources for Bluetooth protection is on the Bluetooth site itself. Following these guidelines should help your students (and you!) stay more secure when using Bluetooth enabled devices.

Discussion Questions for Students:
1) What types of Bluetooth devices do you use on a regular basis? Have you configured them (after pairing them with your devices) into a non-discoverable state so that other Bluetooth devices can’t find them?
2) Have you updated the firmware (for that matter, what is firmware?) in your Bluetooth devices lately? Do you know how to do this? Do you know why it is important to do this?
3) Do you have antivirus software installed on your phone or PDA? Do you keep it updated on a regular basis?

Sunday, December 28, 2008

Have Students Create Their Own Social Networks

Most of my students are already using at least one social network (MySpace, Facebook, Orkut, Friendster). But when you join an existing social network you are locked into their way of doing things. You can't really design your own experience for a particular community. Or can you... ?

Send your students over to Ning which is a site where they can create their very own personal social network... for free!

A five minute sign up process is all it takes to be off and running with your own network. You can invite members, post content, and control the look and feel of your social network's home page. You can choose to have the network viewable by anyone or keep it restricted to members only. You choose the URL for your network, which will end in ning.com, and therefore would look something like this: mycoolnetwork.ning.com. You can host blogs, threaded message forums, and several other features. The learning curve is very low as it has a similar look and feel to established social networks.

So how does Ning make money? The network you set up has rather unobtrusive Google AdSense ads on the side of the page which generate revenue for Ning. If you want to control the ad content on your site and keep the revenue for yourself, all you need to do is pay Ning $10 per month and you can remove all of their ads and put up your own.

I think that setting up a social network makes a great group project for a computer literacy class. Groups of students can compete to sign up the most members, have the largest number of relevant blog postings, generate the most useful message threads, etc. So send your students out there to play around and see what happens.

Saturday, December 27, 2008

Would You Like a Little Cholesterol Medication with That Pizza?

Many people are concerned that technology and the Internet are eroding our personal privacy. The video below is the ACLU's slant on what it might be like to order a pizza in the near future. Fasten your seat belts... it's going to be a bumpy ride!



Now we all hope that this level of scrutiny doesn't happen but my local pizza parlor already tracks orders by phone number. So when I call they usually have a pretty good guess about what I'm going to order. At least they don't have access to my medical records, library records, and magazine subscription information... yet. But with all this information in databases, it is theoretically possible to consolidate it all at the pizza parlor.

Fortunately, the privacy of medical records is protected by law. But say the local pizza parlor did run a coupon in Men's Health magazine. They could buy the list of local subscribers from the magazine and integrate it into their database that is keyed off of caller ID. Then they would be able to mention the coupon to callers who subscribed to Men's Health. It presents interesting possibilities.

Discussion Questions for Students:
1) What types of personal information would you feel comfortable with a merchant (like a pizza parlor) having about you? What types of information would you never want revealed to retailers?
2) What is your position on a national ID card (or the REAL ID)? Is preventing terrorism worth giving up some personal privacy rights?
3) Should personal medical information be more readily available if it could be used to protect your health? Would you feel comfortable with a server at a restaurant recommending healthy food choices based on your medical history?

Friday, December 26, 2008

Memory Problems (And I Don't Mean RAM!)

Perhaps you know someone that has a few problems like the ones Tom Rush describes in this cute little tune.



I show this video on the first day of class. It serves as a great conversation starter because it is always easy to get students talking about themselves (see questions below).

Discussion Questions for Students:
1) What devices and software do you use to keep track of events happening in your personal life?
2) What suggestions would you have for the poor fellow in this video to help him start remembering the important events in his life?
3) Have you ever instructed a parent (or grandparent) on how to use some type of technology? Were there any challenging issues you encountered during this "training"?

Thursday, December 25, 2008

Extending Your Wireless Range & Finding Free Wireless

Many of you have probably experienced the frustration of being out of range of a wireless signal when you need one. Even though hot spots are growing at a rapid pace, you aren't always within range of one that you can log onto for free.

In the video below, Mark Erickson, who creates video podcasts called Infinite Solutions, shows you a hack to extend the range of your wireless card. Although it is disappointing that he doesn't put the tin foil dish on his head, this is still an interesting solution.



And here's a video on a software product called Easy WiFi Radar that helps you easily detect wireless networks that are within range. The software also sees if it can log you into the networks that it detects.



However, you should exercise extreme caution when searching for wireless networks. Just because you can detect a network and log onto it, doesn't mean that you are legally entitled to do so. You could be guilty of violating "piggybacking" laws. Piggybacking is using someone's bandwidth without their permission. So I recommend sticking to hot spots that are free where merchants are encouraging you to log on (such as Panera Bread). Web sites like WiFinder can help you locate hot spots that you may access legally.

Discussion Questions for Students:
1) Have you ever logged onto a wireless network without the owner's permission (such as a neighbor)? What do you think the implications would be if you get caught engaging in this type of activity?
2) Is it illegal where you live to "piggyback" on a wireless signal? Do you feel it should be illegal to connect to an unsecured wireless network without the owner's permission?
3) Where can you go locally to legally connect to a wireless network and get free Internet access? What types of benefits do merchants like Panera Bread derive from providing free wireless access to their customers?
4) If you aren't a customer of Panera Bread, do you think it is fair to sit outside in your car and connect to their wireless network?

Thursday, December 18, 2008

Carry an Operating System in Your Pocket

With large capacity flash drives, we have almost reached the point where we could carry our Windows environment with us in our pocket and have access to our familiar desktop and settings wherever there is a public computer. But we really aren't there quite yet.

A practical solution available now is taking Linux with you on a flash drive instead. Linux isn't geeky and scary any longer. The interfaces for many Linux builds, like Ubuntu (shown below), look almost exactly like Windows.



The advantages of using your own Linux OS on a public computer are:

1) Reduce the risk of picking up viruses and malware from a public computer - When you boot a public computer from a flash drive you completely eliminate any interaction with the public computer's operating system. This significantly reduces the chances that your flash drive will become infected by any malware that may be running and infecting the public computer.

2) Linux isn't as prone to attack - Since Windows has a 91% market share, people who write malware tend to target Windows systems. By running Linux on a public computer, you are much less likely to be the target of an attack or infection.

3) Enhanced privacy - When you run off your own storage medium (flash drive), you avoid reading and writing to the hard disk of the public computer. Therefore, you don't leave traces of your activity behind.

4) Ease of use - Instead of dealing with a different configuration on each public computer you use, you have access to an operating system with which you are familiar.

Sometimes you can't find a public computer that lets you boot from a USB drive. You can also take a CD with you that contains a Linux OS which should help avoid this issue.

You still need some virus protection but fortunately you can get free antivirus programs that run in a Linux environment such as avast! Linux Home Edition. If you buy a flash drive with a switch that allows you to make it a read-only device, this will also increase your level of protection.

I like demonstrating Linux in the classroom because many students have never seen it. Since most of my students have flash drives now, this saves me from burning CDs for them from which to boot the Windows computers. There are many distros (different variations of Linux) that you can choose from to load onto your flash drive. An excellent resource is Pendrivelinux which has many distros available for download and step-by-step instructions on how to install them to your flash drive. Personally, I like Ubuntu and Knoppix as they both include OpenOffice (which is just like using MS Office 2003) and the Firefox browser. But download a couple different distros and see which one you prefer.

And if you have Macs in your labs, there is an option for you too! gOS is a distro that provides a very close approximation of OS X, so you too can feel right at home.

Wednesday, December 17, 2008

Constructing Your Own Computer

It sure is easy to drive down to Best Buy or Costco and buy a computer. But there is something satisfying about building your own computer and configuring it exactly the way you want it. Some students might consider this a daunting task and would never attempt it. Watching the video below will give students a rough idea of what is involved in assembling a computer.



Now I wouldn't suggest running out to build a computer after just watching this video. You probably should do some more research first. Naturally, How Stuff Works has a section on How To Build a Computer. PC Mech has a Build Your Own PC section that gives step by step instructions with over one hour of video.

Although most students won't build a computer from scratch, many students may need to upgrade some components of their computer. For instance, they may need to upgrade the RAM to get the best performance out of the latest version of Windows. Or maybe they are craving a new Blu-ray drive for their desktop computer. There are plenty of videos on YouTube that show how to upgrade a computer, like the one below on how to install RAM.



There are numerous online merchants where you can buy the parts to assemble a computer. Two of my favorite spots are New Egg and TigerDirect. I have friends who have had excellent experiences with New Egg and I have been very satisfied with my purchases from TigerDirect. And Crucial is a fantastic web site for purchasing RAM (as mentioned in the video) which I have used numerous times.

Discussion Questions for Students:
1) Have you ever built, modified or upgraded a computer? If so, how successful were you? (i.e. did the computer work when you got done?)
2) Would you ever consider building your own computer from scratch? What would be the advantages and disadvantages of doing this?
3) If you had problems building or upgrading your computer, who would you consult for help? Does the Geek Squad (at Best Buy) help with assembling computers (or do they just perform upgrades)?

Tuesday, December 16, 2008

Free eBook for Customizing Blog Templates



Bloggerbuster is another useful site that helps bloggers design, build, and write better blogs. Their Blogger Template Design Series of blog posts gives helpful hints and tips for customizing Blogger templates to help them provide the functionality you need. They have now created their own eBook which is an offshoot of their Blogger design posts.

The Cheats’ Guide to Customizing Blogger Templates is available for download in PDF format. The book is free and is full of good examples for tweaking blog template code. If you don’t have the Adobe Acrobat reader, which you need to read PDF files, they provide a link for downloading that as well.

So check it out and you (or your students) might learn a cool new technique that you can put into practice on your blog today!

Monday, December 15, 2008

Free Blog Templates for Blogger.com Blogs

When I assign blogging projects to my students I have them construct blogs on Blogger since it is free and owned by Google (and therefore not likely to go out of business). Blogger offers a number of basic templates from which you can choose, but seeing them on every third blog you look at on the Web can get a bit boring. There are plenty of sites on the Web like pYzam.com where you can download free templates. MySpace templates are especially popular with students as they seem to love to change the look of their MySpace pages on a frequent basis.

The problem with free Blogger templates that you find on most sites is that the XML code may not be well constructed. MySpace seems a bit more forgiving on template code than Blogger. Blogger will refuse to load templates that contain XML coding errors, which either forces you to find and fix the XML errors (beyond the capabilities of most of my students) or to give up and search for another template.



eBlog Templates is a site that offers well-constructed templates for Blogger and Wordpress blogs. Many of the templates are optimized for revenue generation as they contain design elements that feature positioning advertising at the top of blog pages. Accompanying the templates are detailed instructions regarding setting up the various features contained in the template so that they will work with your blog. And best of all, the templates are FREE! You can find the Blogger templates here. They even have a blog for Blogger users that contains links to new templates as well as articles about generating blogs on Blogger.

The template that I use for this blog is from eBlog Templates and is called Daya Earth. I have modified it slightly for my purposes, but it is pretty close to the template that eBlog Templates offers.

How does someone make money giving away free blog templates? When you look at the eBlog site, you will notice plenty of advertising links which probably generates a fair bit of revenue. Also, on each download page, there is a link to the site owner’s Paypal account so you can make a donation. The links implore you: “Isn’t this free template worth at least $1.” Certainly a well-designed blog template with no XML coding errors is worth a great deal more than $1!

So have your students explore the eBlog Templates site and it should help them avoid having to use the same old Blogger templates that you see everywhere on the Web.

Sunday, December 14, 2008

Securing a Wireless Network

Home wireless networks are more susceptible to bandwidth poaching than wired networks because the signal often reaches outside of your home. This makes it easier for hackers or war drivers (people who locate and connect to unsecured wireless networks) to sit outside your home and connect to your network. Your neighbor might be accidentally connecting to your network instead of his own (known as piggybacking) and thereby using some of your valuable bandwidth. Or if you happen to live next door to an unethical person, they might cancel their own Internet account and deliberately connect to yours to save money!

To avoid these scenarios, you should implement security measures on your wireless network. The video below from the Get Connected TV show shows you some simple measures to take to protect your wireless network from unwanted "guests."



Discussion Questions for Students:
1) Have you ever logged onto a wireless network without the owner's permission (such as a neighbor)? Do you think there is anything unethical about "sharing" bandwidth with your neighbor (at their expense)?
2) If you have a wireless network at home, have you implemented security measures such as the ones mentioned in the video or listed on the Practically Networked web site?
3) Do you have a firewall installed on your network? Is it turned on? Do you know what a firewall does and why you should have one? If not, find out at the firewall section of How Stuff Works!
4) Have you tested your network to see if it is secure? If not, try the ShieldsUP test at Gibson Research. What were the results? If your network is not secure, what could you do to make it more secure?

Saturday, December 13, 2008

Online Business - Selling Tumbleweeds Can Have You Rolling In Dough!

Over the years, plenty of people have thought that just knowing a little bit of HTML coding qualified them to be Web site designers. But for Linda Katz of southwest Kansas, practicing her Web design skills helped her launch an entirely new career -- as a tumbleweed farmer!

The Prairie Tumbleweed Farm started out as a simple Web design exercise. Linda wanted to practice her skills and created the farm as a joke back in 1994. But, people found her site and soon began contacting her because they wanted to buy the tumbleweeds! One thing led to another, and Linda now has a thriving business. Her customers include NASA, major Hollywood studios, fashion designers, and ordinary people who just want to own one of these iconic symbols of the old West.

Linda was recently featured on Yahoo!'s People of the Web and she has an interview posted on YouTube, which you can view by clicking the link below:



I find this video is great to start conversations in class about online business opportunities. Students will dream up some unique ideas of their own.

Discussion Questions for Students
1. Do you personally know anyone who is running a successful Internet business? Do you know how they got started?
2. Have you ever considered creating your own online business? What type of product or service would you offer?
3. Hands-on Exercise: Ask students to find a YouTube video featuring an interview with an entrepreneur who operates an online business.

Friday, December 12, 2008

Key2SafeDriving System Prevents Talking on Cell Phones While Driving

Most of us know by now that it is dangerous to use a cell phone while driving. Cell phone usage, even with hands-free phones, diverts attention from driving and makes it more likely that you will get into an accident. Despite numerous safety studies and coverage in the news media, at any one time six percent of drivers are talking on a cell phone while driving according to a 2007 study. The statistics are worse for teenage drivers as ten percent of them are driving while talking or texting on cell phones.

University of Utah engineers have developed the Key2SafeDriving system that features a key that emits a Bluetooth signal. Each driver of a vehicle has their own individual key. When the key is extended from its holder, it communicates with the owner’s phone and puts the phone into “driving mode." The phone cannot be used for talking or texting and displays a red stop sign while in driving mode. Since the key must be extended to insert it into the ignition and drive the car, users can’t fool the phone into thinking they aren’t driving. The University has licensed the technology to a company which hopes to hit the market with this device within six months.



This system may be sold as part of cell phone plans instead of directly to consumers. Using GPS and other technologies, the system could be used to compile a safety score for drivers which could show that young drivers are not engaging in unsafe behaviors such as texting while driving, exceeding speed limits, running traffic lights, and rapid braking. The scores could be provided to insurance companies and used as the basis for granting discounts on insurance.

Discussion Questions for Students:
1. How often do you use your cell phone while driving? Have you ever sent a text message while driving?
2. Do you think using a cell phone while driving is dangerous? Have you ever been involved in an accident or near accident while using your cell phone in the car?
3. How would you feel about having your driving activities monitored by your phone and reported to your insurance company or parents? Do you think this type of system is a violation of your privacy?

Low Cost Microsoft Certification Exams for Students

Many of my students cite high cost as the reason they don’t take Microsoft Certification Exams. But Microsoft finally has a deal for students that is too good to pass up and it will run through June 30, 2009.

The Microsoft Academic Second Shot program allows students to take any Microsoft academic exam for $60. And if they don’t pass it the first time, they can take it again for free. Both the initial test and any retakes have to be completed before June 30, 2009. To participate in this program, students must submit proof that they are “currently a registered full-time or part-time student enrolled in an accredited high school or post-secondary school (institute of higher learning)." Employees of high schools and post-secondary schools are also eligible.

The academic exams (code 072 exams) have the same content as the regular 070 series exams. They merely cost less. Your students need to apply to Microsoft who will mail them a voucher. So have them check out the Academic Second Shot program today and help them prove the value of their learning by obtaining Microsoft certification.

Thursday, December 11, 2008

Dangers of Social Networking Sites

Discussing the dangers of posting too much personal information online with our students often comes off sounding like a lecture from a parent. But these two public service ads produced by the National Center for Missing and Exploited Children usually get a strong reaction from students. They creep me out every time I watch them too!





The accompanying Think Before You Post Web site has some great tips for keeping yourself safe when communicating online.

Discussion Questions for Students:
1. Have you ever posted anything online that you later regretted posting? How has it affected your life?
2. What steps do you take to keep your personal information from becoming available online?
3. Do you have a MySpace or Facebook page or do you post personal information on a similar site? Have you availed yourself of the options available on these sites to keep your information from being indexed or otherwise published online?

Wednesday, December 10, 2008

Straight No Chaser - Viral Video Leads to Record Contract

Questioning the value of having your students create videos and put them on YouTube? Well, there could be monetary gains down the road if their videos are clever.

Consider the ten college buddies that used to sing together. The group was known as Straight No Chaser and one of the members posted an old video of them singing together on YouTube. The video was an amusing version of the 12 Days of Christmas from a 1998 concert. Although the original video is no longer available on YouTube, the 2008 version of the song is shown below:



The original intent was just to have the members of the group wax nostalgic over their former glory days in college. But the video became a viral hit and racked up millions of views. One of the viewers was an employee of Atlantic Records. He contacted the group and offered them a recording contract. The original group is now touring (they haven’t quit their day jobs) and just released a Christmas CD. This is a great example to share with students to show how accidental commercial success can occur on the Internet.

As part of a computer literacy course, I like to have students make videos (or video podcasts) and I have them share the videos on YouTube. If your students manage to produce something particularly clever and entertaining, they might be the next viral video hit. So encourage them to give it a try.

Tuesday, December 9, 2008

Computer Mouse Celebrates Its 40th Birthday

Ask your students when the mouse was invented and I bet most of them won’t go as far back as 1968 for their answer! Embedded below is a video of the first mouse demonstration.



Dr. Douglas Engelbart used a wooden mouse with one button at a demonstration during the Fall Joint Computer Conference (FJCC) in 1968. The mouse, which was actually constructed by Bill English, was used to demonstrate a computer system called the NLS. The NLS was light years ahead of the uses mainframe computers were being put to at the time and this demonstration showed how text files could be clipped, copied and pasted (all key functions in word processors and Windows…which hadn’t been invented yet!). The NLS was also used to demonstrate how users could use computers to collaborate on document design and editing (the first Wiki?).Keep in mind that Arpanet, which was the precursor to the modern Internet hadn’t even been set up at this point.




The concepts used in the NLS were so advanced that the folks that designed it had to build their own components (hence the mouse made of wood). The NLS became the first program to be used on Arpanet when it came into being in 1969. However, the NLS was difficult to learn to use as it was targeted for use by highly trained computing professionals and never was deployed commercially. But it did lay the groundwork for many functions of the personal computers that we have today.

So light the candles and pass a piece of cake in celebration of the birthday of the computer mouse!

Monday, December 8, 2008

Photo on Social Networking Site Leads to Jail Time!


I'm always telling my students that putting questionable pictures on social networking sites and blogs might cause them problems in the future. Despite repeated warnings of employers (22% based on a recent survey) reviewing social networking sites to check on prospective and current employees, many students just don't seem to get the message. Perhaps this chilling tale of woe might just do the trick.

Joshua Lipton was in court for charges stemming from a drunken driving accident in which another person was seriously injured. I'm guessing that his defense attorney was planning on painting a picture of his client as a young man who made a terrible mistake but was sorry for his reckless actions. Then the prosecutor whipped out a photo of Lipton (shown at the left) that was taken two weeks after the accident. Lipton was attending a Halloween party dressed in an orange jumpsuit labeled ‘Jail bird’. Using the photo as evidence, the prosecutor described Lipton as an unrepentant individual joking and partying while his victim was recovering from injuries. The judge obviously agreed with the prosecutor's view and Lipton received a two year jail sentence.

So where did the prosecutor find such a damaging photo of Mr. Lipton? It was on a Facebook page from someone who attended the party! Maybe your students aren't involved in court cases, but I doubt that prospective employers would be impressed by this photo. There is a simple message here - think before you post...or before you let friends take ill-advised photos of you doing something stupid!

Discussion Questions for Students:
1. Have you (or your friends) ever posted photos of you online that you feel a potential employer should not see? Do you think these photos would affect you landing employment?
2. Should employers check the Internet for information before hiring potential employees? Why or why not?
3. Do you think that you should have a right to privacy regarding information you place on a MySpace or Facebook page? How would you ensure that your privacy was protected?

Sunday, December 7, 2008

Classroom 2.0 - The Social Network for Educators Using Collaborative Tools

Classroom 2.0 is a social network designed for educators who are using (or are interested in learning about) Web 2.0 tools and collaborative technologies in and out of the classroom. You can join Classroom 2.0 for free and contribute to the community or just browse through existing resources. The network was designed using a free social network creation tool called Ning. I have my students use Ning to construct their own social networks and Classroom 2.0 is a great example to show students how cool a well designed social network can look when it is completed.

Classroom 2.0 has over 14,500 members and the site maintains blogs and discussion forums on almost any Web 2.0 topic you can imagine. So cruise over and check them out and I’m sure you’ll find useful suggestions for technologies and techniques that you can integrate into your classes.

Voki - Add Speaking Avatars to Your Site for Free!

Avatars that speak messages are not new to the Internet. They have been around for years. However, most companies that provide avatars, such as SitePal, are geared toward providing avatars for businesses and charge for their services.

Oddcast, the company who owns SitePal, has developed Voki which is a site where you can create free avatars to use on your blog, in your social network profile, or just to send messages to people. According to the Voki site information page, the name Voki “is a combination of ‘vox’, which is Latin for voice, and ‘Loki’, which, is a prankster character in Norse Mythology.” At the Voki site, you can custom design your avatar from a variety of available characters such as people, monsters, and animals just to name a few. You can adjust the look and feel of your avatar by changing its characteristics (such as hair, jewelry and clothing). Then you can record a message for your avatar to speak using your own voice or one of several computer generated voices that translate message text to spoken words.

The avatar below is one I created with Voki to welcome you to my blog. Click on the play button and check it out. Notice that Voki supports this service by displaying an advertisement on the bottom of the avatar. Also notice the scary way the avatar's eyes follow your mouse as you move it around your screen!


Get a Voki now!

Voki is free for personal use but is not sanctioned for commercial use. Therefore, it should be fine for educational purposes such as having students integrate Voki characters into a blog. Instructors can also use Voki to communicate with their students and greet them when they visit instructor Web sites. An example of how Vokis are being used in schools can be found in this instructor’s profile on Classroom 2.0.

Creating a Voki makes a good exercise for students. After they create an avatar and post it to their blog, you can lead them into a discussion about how avatars can be used to enhance a business Web site. The SitePal Success Stories page gives plenty of examples of ways that their customers have utilized avatars to communicate and connect with customers.

Related posts: Classroom 2.0

Recycling Technology - Dispose of Broken Computing Devices Responsibly

Here's a catchy little tune called the Dead iPod song. It describes what to do with your iPod when it inevitably dies.



For a much scarier perspective on e-waste and the problems of toxins, check out The Electronic Wasteland that aired on 60 Minutes. It profiles one of the most toxic places on earth...a town in China that specializes in extracting precious metals from e-waste. It is amazing that anyone can survive there!

Many companies now have recycling programs. Apple has an iPod and cell phone recycling program which provides you with a free (they pay the postage) way to send in your broken iPods and cell phones for environmentally responsible disposal. Dell's recycling program always provides free recycling for Dell branded products. And if you buy a new Dell system and select free recycling at the time of purchase, Dell will even recycle your old computer and monitor for free even if it isn't a Dell product.

Discussion Questions for Students:
1) Do you have any broken computing devices at home? How are you planning on disposing of them?
2) Have you ever thrown an old computing device in the regular trash? What impact do you think this had on the environment?
3) HANDS-ON ACTIVITY: Search the Web for technology recycling programs in your area that accept old computers and monitors. Are there limitations on what types of devices they accept? Is there a charge to the consumer for recycling?

Saturday, December 6, 2008

Camstudio - Open Source Alternative to Camtasia Studio

One of the best ways to learn a subject or to demonstrate mastery of a topic is to teach it to someone else. So why not assign student projects that require them to create videos that explain the functionality of Microsoft Office, a Web site, or another application software package? Students can then produce podcasts from their videos using Windows Movie Maker and deploy them on YouTube or Podbean. Now that is Web 2.0 learning in action! But, since many colleges don't have a video tool deployed for the students to use, a free tool for recording on-screen activity is needed.

Fortunately, CamStudio is an open source software package that is based on the popular Camtasia Studio product from Techsmith. The software is easy to install and learn to use. They even provide a handy video on downloading CamStudio. The help files in the product will get you familiar with how to use it. The recorder has simple basic functionality similar to older versions of Camtasia Studio.



Although CamStudio is not as fully-functional as the current version of Camtasia Studio, the basic functionality is similar. For pure ease of use, Camtasia Studio 5 does offer significant advantages and I prefer to use Camtasia Studio. But if your college doesn't have a site license for Camtasia Studio or your students don't want to spend $299 to buy the software for home use, CamStudio is the way to go. So have the students download CamStudio and get them creating their first podcasts this week!

Friday, December 5, 2008

Microsoft Office 2007 for Students - Cheap!


Microsoft is running an offer especially for college students call The Ultimate Steal. For a limited time, students can obtain a copy of Microsoft Office 2007 Ultimate Edition for only $59.95. To qualify for this offer, you must be enrolled at a U.S. educational institution and have a valid e-mail address that ends in the .edu domain. Considering this package is available at retail for around $500, this is a fantastic deal for students. So click here and save some $$$ today!

Download Video From YouTube

Nothing is worse than having a great video from YouTube identified to start a class discussion and then finding out your network connection is down. You can avoid this unpleasant experience by installing a free product called YouTube Downloader from Biennesoft.

This freeware (no cost to use it) enables you to download videos from YouTube (and other sites) and save them to FLV (Flash video) files. Now FLV files are pretty useless since it is difficult to find players to play them back. Fortunately, the program allows you to convert the FLV files to more useful formats for display on devices such as iPods, iPhones, PSPs, cell phones, and Windows Media Player. You can even export just the sound to an MP3 file.

The software is dead simple to use. Just paste in the URL of the video and click OK to save it as an FLV file.



To convert to another format, browse to where the FLV file was stored and select it. Then choose the appropriate conversion format and click OK to convert. It couldn't be easier!



By downloading the video and converting it into an appropriate format you won't have to worry about losing your Internet connection. This also makes it handy for distributing the file via e-mail or in a course management system.

Using Wikis in the Classroom

Before you can launch students on a group project involving wikis, you obviously need to explain what wikis are and their basic functionality. Students can get a quick grasp of the basics of wikis by watching this video:



And, a good article from Information Week explains How to Use Wikis for Business. If you have students watch the video and read this article before class, you can get them up to speed on the idea of wikis pretty quickly.

Naturally, the students will need a free wiki site to use for any wiki project you assign. Two of my favorites are Wikispaces and PBwiki. They are both very straightforward and easy to use but currently PBwiki has a slicker feature set.

Wikis are obviously great for group projects because of their collaborative aspects. Here are a few approaches you could take:

1) Student Study Guide - Have the students create and edit pages that provide a study guide for each chapter (or topic) you cover in class. This requires explaining concepts in their own words which reinforces learning. And this type of wiki can act as a repository of knowledge that next semester's students could update and expand.
2) Wiki Moderator - Have a student create and moderate a page (that other students update) for a week. The page should cover one topic from the current course content and aim to provide a comprehensive summary of the topic.
3) Battling Business Units (with apologies to Dilbert) - Have competing groups create wiki pages on the same topic. Then assign one group each week to review all the pages on that topic and combine them into one comprehensive (definitive?) resource.

And if you need some inspiration for projects or additional insight for students, check out the wiki resources below.

42 Ways to Use Wikis - Want to get started but need some inspiration?

Using Wikis with K-12 Students - Works for college students too!

GrowYourWiki - A blog site that provides excellent ideas about growing the community that is participating in your wiki.

Weblogg-ed Presentation Links - Even more info on wikis.

Green Maven - Find Green Websites Quickly



Although specialized search engines abound on the Web, Green Maven is the first engine specifically tailored to generate search results only from "green" Web sites. Aside from searches of green sites, Green Maven also offers a Green News Reader which pulls postings from green blogs and other green news sources. Finally, if you don't want to use the search engine, the Green Maven Directory is set up in categories so you can easily browse (by topic) the sites indexed in their search engine.

So next time you are looking for that perfect computer recycling site or a source for compost supplies, head over to Green Maven.

On Demand Printing - The Solution to the High Cost of Textbooks?

On Demand Books, a New York company, has recently announced the second version of their Espresso Book Machine. This machine is designed to print books on-demand from PDF files. At 112 pages per minute, it prints pages and a cover, trims them, and then binds it all into a high quality paperback book. This all takes place while you are sipping a latte (or your beverage of choice). The machine can generate books from 40 to 830 pages in length at a cost of about one penny per page. You can find full details of the Espresso Book Machine in this article from Book Business magazine.

Widespread use of on-demand book publishing machines would reduce costs for book publishers. There would be no need for the book publishers to incur shipping costs to ship books to bookstores. Publishers wouldn’t have to guess about the demand for a book and possibly print extra copies that are never sold. And the large warehouses that publishers currently have to house their printed books while they await shipments to retailers would no longer be required.

Bookstores should also reap considerable savings. Bookstores would not need to tie up large sums of money by keeping thousands of books in inventory. There would never be any unsold books to return to the publisher (which saves shipping expenses). And bookstores could be much smaller as they would only need to house a few of these machines instead of rows of shelves for printed books. However, the bookstore cost savings would be offset by the need for the bookstores to stock the paper and printing supplies to print the books.

All of these factors might allow books to be sold at lower prices. The reason that on-demand printing hasn’t been popular so far is that it hasn’t been fast enough or cost-effective enough to replace pre-printing books. But with the introduction of the Espresso Book Machine 2.0, these problems look like they may have been solved. This could be a boon for students if it allows for reductions in the cost of textbooks.

Check out this video of the Espresso Book Machine 2.0 in action!

Thursday, December 4, 2008

What is the Digg This Story Button?

Digg is a site that encourages the community (Digg members) to vote for (votes are called Diggs) content that they find on the Internet. If a particular piece of content (whether it be a blog post or a video) gets enough Diggs, it is shown on the front page of the Digg site. Since millions of people visit Digg every day to look for new and interesting sources of information, having your content added to Digg by Digg community members can increase your visibility on the Internet.

Since successful blogs depend on garnering many readers, it is a good idea to make it easy for people to Digg your blog posts. Therefore, I place a Digg This Story button after every blog post to make it easy for my readers to submit my blog posts to Digg. If you find one of my posts particularly useful, I encourage you to submit it to Digg. This will help spread the word to other potential readers.

Why Does This Blog Have Ads?

Since this site is also an instructional tool for my students, it does have a few advertisements. I encourage my students to start their own blogs and set them up to potentially make a profit and therefore, I provide a few examples of ways that you can monetize a blog, such as:
  • PayPerPost – This is a service through which advertisers pay bloggers to blog about their products or services. Many of my students enquire about paid blogging opportunities. Since PayPerPost is the oldest and best known, I’ve included links to this site on this blog so my students can easily register.
  • Amazon Associates – Affiliate programs pay bloggers (or other web site owners) when they send people to another site and the people they send end up purchasing a product or service. Amazon Associates is a well-established affiliate program that is free to join and very easy to set up. When you place links to Amazon on your site through the Amazon Associates program, you are paid a commission when your blog readers follow those links and purchase products on Amazon.com. Many of my students join Amazon Associates and feature these links on their blogs.

About the Author

My name is Alan Evans and I’m an adjunct instructor at Montgomery County Community College in Blue Bell, PA, Moore College of Art and Design in Philadelphia, PA, and at Manor College in Jenkintown, PA. I’ve been teaching computer literacy and business courses at the collegiate level since May of 2000.

I am also one of the authors of Technology in Action, a market-leading computer concepts text published by Prentice Hall. Technology in Action is used in over 250 colleges and universities throughout the world and is designed primarily for freshman and sophomore computer literacy courses. I have also co-authored a book on Web 2.0 tools and written a book on computer ethics.

Purpose of This Blog

This blog is designed for instructors who are teaching computer literacy courses, Microsoft Office courses, or other courses where computer technology, the Internet, and software are covered as part of the curriculum.

I’ve been teaching technology courses since May 2000 at the collegiate level and I am constantly researching technology topics to provide a basis for discussions, homework, projects, or hands-on lab exercises for my students. This blog is designed to share the results of my research. I hope you find the topics that I cover here useful for your courses.

As technology is constantly changing, I encourage my students to perform research on new and emerging technologies as part of their grade in my courses. I also encourage students to use Web 2.0 tools such as blogs, social networks, and wikis to enable them to practice their writing skills, as well as to familiarize them with cutting edge tools that they can use when they enter the business world. A secondary objective of this blog is to provide an example to my students of ways to utilize Web 2.0 technologies. If you are a student, I hope you will find the topics discussed here relevant to your course work.

Please leave appropriate comments on the blog entries as I love to exchange ideas with other instructors and students. The comments to this blog are moderated so your comments will not be immediately visible on the blog.