Teague's Tech Treks

Learning Technology and other Tech Observations by Dr, Helen Teague

By

Edorble WebVR Launches!

The innovative folks at Edorble have something fun to announce! There is a new alpha of Edorble WebVR, a cross-platform, browser-based multiplayer Edorble experience. Edorble WebVR works on Android, iOS, Mac, PC, Google Cardboard, Daydream, Oculus Rift, HTC Vive, and Gear VR. If curious to hear more, check out what you can in Edorble WebVR on their blog post announcing the launch. You can also just jump right in at https://edorble.com/webvr. Edorble will be building on this foundation in the weeks and months to come, and with participatory help from users, they will keep shaping it into something special for teachers and students around the world.

Edorble VR

By

Got Summer Spare Change? Own a Piece of Tech History!!

ENIGMA MachineThe original 1944 ENIGMA Cipher Machine, used at Bletchley Park during World War 2 to crack the codes of the Nazi Third Reich U-Boats, is up for auction at Christie’s Auction House, June 15 (Thursday) in New York City.

This machine was central to World War 2 and the British used it to crack the codes that won World War 2. The ENIGMA Cypher Maichine performed 159 billion, billion combinations.And it still works!

Also in the auction is the first APPLE 1 1976 Personal Computer made of steel, with 4K (expanded to 12K) of RAM.

Estimated Value is $300,000-500,000

The Christie’s auction is live and online, according Peter Carnett

 

 

 

 

Image Source

By

Internet History Lesson

By

October is National Cyber Security Awareness Month – Part 4

NCSAMIn this last post, (Part 4) for Cyber Security Awareness Month

Get savvy about Wi-Fi hotspots: Limit the type of business you conduct at a local hotspot. For instance, you might not want to do your banking while at Starbucks.

Protect your $$: When banking and shopping, check to be sure the site is security enabled. Look for web addresses with “https://” or “shttp://,” which means the site takes extra measures to help secure your information. “Http://” is not secure.

Share with care: Think before posting about yourself and others online. Consider what a post reveals, who might see it and how it could be perceived now and in the future.

Learn more at the NCSAM website.

~~~~See All Posts for This Month~~~

National Cyber Security Awareness Month – Part 1 Post

National Cyber Security Awareness Month – Part 2 Post

National Cyber Security Awareness Month – Part 3 Post

By

October is National Cyber Security Awareness Month – Part 3

NCSAMThis post, (Part 3), provides some great Every Day Tips for Online Safety during this blog’s emphasis on Cyber Security Awareness during the National Cyber Security Awareness Month. Learn more at the NCSAM website.

 

What tips would you share for safe-keeping your online information?

 

~~~

National Cyber Security Awareness Month – Part 1 Post

National Cyber Security Awareness Month – Part 2 Post

 

Link to Part 2

By

October is National Cyber Security Awareness Month – Part 2

NCSAMIn Part 2 of this blog’s Cyber Security Awareness focus, here are some general recommendations for keeping your information safe from my university technology department:

Use Unique Passwords For Each Site

This may seem overwhelming, but with the use of a proper password manager, it can be done. Let’s say you don’t feel you can handle that many passwords though. You should, at minimum, have a unique password for your email and bank account logins. Here is why: The Holy Grail of account access for a person with ill intent is your email account. If you think about it, it makes sense, everything else connects to that. How does any other account do a password reset? It emails you a link. If someone gains access to your email account, they effectively gain access to everything. As for your bank account, there is so much that you can do with online banking now-a-days that access to your bank account is essentially direct access to your money.

But how does having a unique password help? When a hacker gains access to one account, the first thing they often do is check to see if that username and password work on anything else. It’s like finding a key and then checking every door to see if it will open, with a focus on the doors that guard the most important stuff.

Create Secure Passwords

There are many options for generating secure, memorable passwords. First, be sure to avoid including any personal information as part of your password. Don’t use the name, birth date, initials, or anniversaries of yourself, your family, or your pets. Don’t use common passwords like 123456 or password. You can find a list of the top 500 passwords here. Don’t use any of those.

One method for generating a secure password is stringing together four unrelated words. A primary example is XKCDs popular “correct horse battery staple“. Just don’t utilize words that might be obvious, like “MikeJohnAnneSuzy” if those are the names of your children. Another method would be to utilize first letters of a long phrase or scripture. For example, “In the beginning God created the heavens and the earth” turns into “ItbGcth&te”, which might be a good password if I hadn’t just provided it as an example here. Need a number for the password requirement? Change it to “1tbGcth&te”.

There are many other methods for generating a secure, memorable password. You can find several more examples here.

~~~

Learn more at the NCSAM website

National Cyber Security Awareness Month – Part 1 Post

National Cyber Security Awareness Month – Part 3 Post

By

October is National Cyber Security Awareness Month: Part 1

NCSAMTips for National Cyber Security Awareness Month (NCSAM)

Use a strong, unique password for every website. It is recommended that you install and use a password manager.

Having separate passwords for every account helps to thwart cyber criminals. At a minimum, separate your work and personal accounts.

Set your smartphone to lock after a short idle time, and set it to require authentication for unlocking. If at all possible, use something stronger than a four-digit PIN.

Never click links in emails or texts that seem to come from your bank, the IRS, or any other institution. If you think the message might be valid, log into your account directly, without using the supplied link.

Learn more at the NCSAM website.

Click here for a pdf poster and click here for a jpeg infographic from NCSAM

 

~~~

More tips to come next week… in National Cyber Security Awareness Month – Part 2

National Cyber Security Awareness Month – Part 3 Post

By

Simulations in Blended Learning Webinar

Learning a lot from talented educators in my webinar addressing the learning potential of simulations in blended learning for the Blended Learning Professional Group at James Cook University, Queensland. Just admiring the technology of clearly hearing each other with no delay from over 8548 miles between us. If you would like to have a customized version of this presentation delivered to your group, please contact me.

twitter edited

By

Amazon Prime Day ~ Today!

Get ready for super-fun Amazon Prime Day!  Prime Day is the biggest online shopping day of the summer! Last year, according to Market Track and Qualtrics, about 30% of US internet users participating in the Amazon Prime Day sale. The web site eMarketer expects this year’s Prime Day to surpass out last year because of the surge of  Amazon Prime memberships, which grew from  50.8 million in 2015 to 67.7 million so far this year. Amazon Prime customers, are nearly half of its U.S. customer base. Prime customers spend, on average $1,200 on Amazon compared to non-Prime customers who spend approxiamately $700.

Go E-commerce!

By

My First Vine ~ From the Cliffs of Moher

Skip to toolbar