Linux is an open-source, Unix-like operating system that runs on multiple hardware platforms. It began in 1991 when Linus Torvalds began developing the Linux kernel. Major milestones in Linux's history include the first Red Hat commercial Linux distribution in 1994 and the kernel version 2.4 in 2001 which supported essential PC functions. Linux is widely used for web hosting, home servers, media centers, and more. Popular Linux distributions include Ubuntu, Debian, Red Hat Enterprise Linux, and Archlinux. Reasons to switch to Linux include security, low cost, stability, ease of use, compatibility with other operating systems, and widespread community support.
The document discusses how to get involved with the Gentoo Linux project. It describes Gentoo as a source-based distribution maintained by volunteers that provides flexibility and customization. It outlines several ways for users to help, such as submitting bugs, contributing documentation or code, and testing packages. The recruitment process involves initially helping users, then being mentored before undergoing a probationary period and becoming a full developer. While development is emphasized, contributions through other roles are also encouraged.
Ubuntu is a popular open source operating system used by millions of users around the world. It can be used on desktops, servers, and other devices. The tutorial provides an overview of using Ubuntu, including how to browse files and folders, use office apps to create documents, browse the web, manage photos and videos, access games and apps from the software center, use developer tools, and control the computer through the command terminal. In conclusion, Ubuntu is free to use, stable, and continuously improving.
Ubuntu is a free Linux operating system based on Debian that is perfect for laptops, desktops, and servers. It uses a six-month release cycle with long term support versions released every two years that are supported for three to five years. The latest version, Ubuntu 9.04, was released in April 2009 and comes preinstalled with software like OpenOffice, Firefox, and games.
The document summarizes a Linux workshop covering topics like installation, file and user management, basic commands, shells, processes, software installation, hardware configurations, and an introduction to free and open source software (FOSS). It provides background on Linux and why organizations may want to migrate to it from other operating systems due to issues like crashing, viruses, vendor dependence and unpredictability. It also briefly explains what a boot loader and GRUB are and their roles in system startup.
The document discusses the origins and timeline of several major open source projects including Linux, OpenClinica, and Nginx. It notes that Linux was started as a hobby by Linus Torvalds in 1991 to create an operating system similar to Minix and shares Richard Stallman's views on the long history of software sharing. It also examines motivations for open source work like purpose, learning from others, mastery, and autonomy.
Vagrant allows users to easily create and configure lightweight, reproducible, and portable development environments. It works with virtual machines and containers to provide a consistent environment. The document outlines how to install and use Vagrant with Docker containers to build portable development environments across different platforms. Key steps include initializing a Vagrant project, selecting a base box, configuring the Vagrantfile to provision Docker containers, and running vagrant up to launch the environment.
This document provides an overview and goals for a desktop support essentials presentation. It discusses organization, communication skills, continuous learning, and both hardware and software tools that are useful for desktop support. It highlights a free online training site called Cybrary.it that provides courses in CompTIA, Microsoft, and other certifications. The presentation also showcases various hardware and software troubleshooting tools for issues like hard drive data recovery, password retrieval, and Windows tweaking. It concludes with a discussion period.
Schoology is a learning management system that offers standard features like folders, tests, quizzes, files, discussions, and pages. It also provides bonus features such as portfolios, easy assignment feedback, collaboration tools, and groups. Schoology integrates with Skyward to automatically reset courses each year, update rosters nightly, and sync secondary gradebooks. It also integrates with Office 365 for single sign-on and submitting assignments from OneDrive and OneNote notebooks. Additionally, Schoology works with various educational tools and systems.
This document lists various literacy resources for educators organized into categories including common websites for educational materials, literary works available online, education platforms, tools for creating content, animation tools, video hosting sites, massive open online courses, and the SAMR model for technology integration with questions or thoughts.
Technology Leadership: Transforming a CultureJason Murray
This document discusses transforming an organization's culture by starting important conversations. It recommends identifying decision makers, taking inventory of the current culture, and having discussions and debates to establish a timeline and benchmarks for cultural changes.
This document provides guidance on creating effective eLearning by outlining key steps and considerations. It recommends identifying learner needs, setting goals, and deciding how to measure success. It then discusses available resources like devices, content, and student experience. Various eLearning tools and platforms are presented, such as Moodle for activities, forums, and assignments. Different presentation structures like online, blended, and flipped classroom models are covered. The document concludes by encouraging the development of an action plan with measurable goals and associated student activities.
The document discusses optimizing Linux performance at various levels. It covers recompiling the kernel to optimize settings, monitoring CPU, memory, I/O, and network usage. Specific tools like vmstat, iostat, top, and htop are recommended. Optimizing includes adjusting settings like the I/O scheduler, disk cache policy, and TCP parameters. The kernel loads and decompresses to initialize essential subsystems before probing hardware and loading additional modules.
This document discusses using gamification and serious games in education. It defines gamification as using game elements in non-game contexts. Some strategies discussed are gamifying grading, homework, and assessments using points, badges and leaderboards. Serious games are described as simulations that can be used for virtual tours, labs, or assignments with game elements. Developing a multiplayer classroom is discussed as creating a story with avatars, roles, quests, and levels to gamify the learning process. Examples of tools and games that can be used are also provided.
This document discusses the development of a virtual professional development model for teachers. Traditionally, professional development had limited topics, time, and differentiation. The new virtual model uses an online learning platform and embedded tools to provide flexible, self-paced courses on diverse topics. Courses are differentiated by level and include interactive lessons, forums, and deliverables. Progress is automatically tracked, and teachers can access materials anytime. While developing content and ensuring adoption were challenges, the virtual approach offers benefits like customization, collaboration, and cost effectiveness over traditional professional development.
Flipped meetings aim to maximize engagement and decision making by sharing preparatory materials before the meeting and dedicating meeting time to discussion rather than presentation. Examples are given of companies like Amazon, LinkedIn, and a school district that share articles or questions for pre-meeting homework. During the meeting, there is guided discussion of the shared materials rather than one-way presentations. The benefits cited include generating better ideas, building leadership, and increasing efficiency. Various tools and formats are provided for the pre-meeting, meeting, and post-meeting portions of flipped meetings.
Jason Murray is an expert in virtual reality education who focuses on immersion, authentic learning, and engagement. He uses virtual reality to mimic traditional classrooms where he can lecture and teach new skills, while also encouraging students to explore collaboratively and develop their skills. His goal is to develop virtual environments that focus students.
This document provides information about the A.L.I.C.E. response strategy for responding to active shooter situations. It discusses how traditional lockdown approaches are insufficient on their own and limit options for survival. A.L.I.C.E. training teaches people to Alert others to danger, Lockdown if escape is not possible, counter aggressors if needed to survive, provide real-time Information updates, and Evacuate to safety if possible. The goal is to give people more options than passive hiding by teaching mental preparation, situational awareness, and how to take active measures like distraction and swarming attackers if necessary to survive until help arrives.
A strategic view of mobile device managementJason Murray
This document discusses best practices for developing a Bring Your Own Device (BYOD) policy and mobile device management (MDM) strategy. It recommends deciding which mobile operating systems and corporate resources will be accessible, developing clear use policies and security controls, educating users, and selecting an MDM platform to enforce policies. Remote wiping of lost or stolen devices should be a minimum security measure, and policies should balance control with respecting users' personal devices. Training is key to ensuring users understand and follow the strategy.
The document provides an overview of various topics related to foundation, app development, programming, data, networking, leadership, emerging media, virtualization, cyber security, and artificial intelligence. It also discusses opportunities such as co-ops and clubs. Some restrictions are in place due to federal regulations, funding constraints, and limited technical staff and administrators responsible for a large number of devices, networks, databases and other infrastructure.
This document discusses various mobile learning tools for organization, productivity, content delivery, and creativity. It describes apps like Pinterest, Corkboard.me, and Diigo that can help organize resources; Evernote, Dropbox, and Google Drive for productivity and file storage; Study Blue and Bump for content delivery; and Videolicious and Animoto for creating multimedia content. The document provides tutorials and examples of how these various mobile apps can be used for educational purposes.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
This document discusses plans for implementing virtual professional development opportunities for instructors. It outlines frameworks like virtual and blended models. It details specific software and platforms like Moodle, Big Blue Button, and Panopto that can be used for content delivery. Pilot programs are suggested, including a virtual summer academy lasting a week with sessions each day, and virtual in-service sessions to provide flexibility. Monitoring engagement and completion is recommended through Moodle reports, activities, and surveys. Lessons learned will be collected through debriefing to modify and improve future virtual programs.
This document discusses mobile learning (mLearning) and provides examples of mobile apps that can enhance learning. It defines mLearning as leveraging mobile devices to improve the learning experience. It examines mLearning strategy and emphasizes the importance of understanding audiences, planning, and using imagination. The document then showcases several apps that can help with organization, productivity, content delivery, creativity, analysis, and more for mLearning.
This document provides an overview and goals for a desktop support essentials presentation. It discusses organization, communication skills, continuous learning, and both hardware and software tools that are useful for desktop support. It highlights a free online training site called Cybrary.it that provides courses in CompTIA, Microsoft, and other certifications. The presentation also showcases various hardware and software troubleshooting tools for issues like hard drive data recovery, password retrieval, and Windows tweaking. It concludes with a discussion period.
Schoology is a learning management system that offers standard features like folders, tests, quizzes, files, discussions, and pages. It also provides bonus features such as portfolios, easy assignment feedback, collaboration tools, and groups. Schoology integrates with Skyward to automatically reset courses each year, update rosters nightly, and sync secondary gradebooks. It also integrates with Office 365 for single sign-on and submitting assignments from OneDrive and OneNote notebooks. Additionally, Schoology works with various educational tools and systems.
This document lists various literacy resources for educators organized into categories including common websites for educational materials, literary works available online, education platforms, tools for creating content, animation tools, video hosting sites, massive open online courses, and the SAMR model for technology integration with questions or thoughts.
Technology Leadership: Transforming a CultureJason Murray
This document discusses transforming an organization's culture by starting important conversations. It recommends identifying decision makers, taking inventory of the current culture, and having discussions and debates to establish a timeline and benchmarks for cultural changes.
This document provides guidance on creating effective eLearning by outlining key steps and considerations. It recommends identifying learner needs, setting goals, and deciding how to measure success. It then discusses available resources like devices, content, and student experience. Various eLearning tools and platforms are presented, such as Moodle for activities, forums, and assignments. Different presentation structures like online, blended, and flipped classroom models are covered. The document concludes by encouraging the development of an action plan with measurable goals and associated student activities.
The document discusses optimizing Linux performance at various levels. It covers recompiling the kernel to optimize settings, monitoring CPU, memory, I/O, and network usage. Specific tools like vmstat, iostat, top, and htop are recommended. Optimizing includes adjusting settings like the I/O scheduler, disk cache policy, and TCP parameters. The kernel loads and decompresses to initialize essential subsystems before probing hardware and loading additional modules.
This document discusses using gamification and serious games in education. It defines gamification as using game elements in non-game contexts. Some strategies discussed are gamifying grading, homework, and assessments using points, badges and leaderboards. Serious games are described as simulations that can be used for virtual tours, labs, or assignments with game elements. Developing a multiplayer classroom is discussed as creating a story with avatars, roles, quests, and levels to gamify the learning process. Examples of tools and games that can be used are also provided.
This document discusses the development of a virtual professional development model for teachers. Traditionally, professional development had limited topics, time, and differentiation. The new virtual model uses an online learning platform and embedded tools to provide flexible, self-paced courses on diverse topics. Courses are differentiated by level and include interactive lessons, forums, and deliverables. Progress is automatically tracked, and teachers can access materials anytime. While developing content and ensuring adoption were challenges, the virtual approach offers benefits like customization, collaboration, and cost effectiveness over traditional professional development.
Flipped meetings aim to maximize engagement and decision making by sharing preparatory materials before the meeting and dedicating meeting time to discussion rather than presentation. Examples are given of companies like Amazon, LinkedIn, and a school district that share articles or questions for pre-meeting homework. During the meeting, there is guided discussion of the shared materials rather than one-way presentations. The benefits cited include generating better ideas, building leadership, and increasing efficiency. Various tools and formats are provided for the pre-meeting, meeting, and post-meeting portions of flipped meetings.
Jason Murray is an expert in virtual reality education who focuses on immersion, authentic learning, and engagement. He uses virtual reality to mimic traditional classrooms where he can lecture and teach new skills, while also encouraging students to explore collaboratively and develop their skills. His goal is to develop virtual environments that focus students.
This document provides information about the A.L.I.C.E. response strategy for responding to active shooter situations. It discusses how traditional lockdown approaches are insufficient on their own and limit options for survival. A.L.I.C.E. training teaches people to Alert others to danger, Lockdown if escape is not possible, counter aggressors if needed to survive, provide real-time Information updates, and Evacuate to safety if possible. The goal is to give people more options than passive hiding by teaching mental preparation, situational awareness, and how to take active measures like distraction and swarming attackers if necessary to survive until help arrives.
A strategic view of mobile device managementJason Murray
This document discusses best practices for developing a Bring Your Own Device (BYOD) policy and mobile device management (MDM) strategy. It recommends deciding which mobile operating systems and corporate resources will be accessible, developing clear use policies and security controls, educating users, and selecting an MDM platform to enforce policies. Remote wiping of lost or stolen devices should be a minimum security measure, and policies should balance control with respecting users' personal devices. Training is key to ensuring users understand and follow the strategy.
The document provides an overview of various topics related to foundation, app development, programming, data, networking, leadership, emerging media, virtualization, cyber security, and artificial intelligence. It also discusses opportunities such as co-ops and clubs. Some restrictions are in place due to federal regulations, funding constraints, and limited technical staff and administrators responsible for a large number of devices, networks, databases and other infrastructure.
This document discusses various mobile learning tools for organization, productivity, content delivery, and creativity. It describes apps like Pinterest, Corkboard.me, and Diigo that can help organize resources; Evernote, Dropbox, and Google Drive for productivity and file storage; Study Blue and Bump for content delivery; and Videolicious and Animoto for creating multimedia content. The document provides tutorials and examples of how these various mobile apps can be used for educational purposes.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
This document discusses plans for implementing virtual professional development opportunities for instructors. It outlines frameworks like virtual and blended models. It details specific software and platforms like Moodle, Big Blue Button, and Panopto that can be used for content delivery. Pilot programs are suggested, including a virtual summer academy lasting a week with sessions each day, and virtual in-service sessions to provide flexibility. Monitoring engagement and completion is recommended through Moodle reports, activities, and surveys. Lessons learned will be collected through debriefing to modify and improve future virtual programs.
This document discusses mobile learning (mLearning) and provides examples of mobile apps that can enhance learning. It defines mLearning as leveraging mobile devices to improve the learning experience. It examines mLearning strategy and emphasizes the importance of understanding audiences, planning, and using imagination. The document then showcases several apps that can help with organization, productivity, content delivery, creativity, analysis, and more for mLearning.