HUD signs a VCA with Portsmouth Redevelopment and Housing Authority that, among other remedies, transferred complainant to an accessible unit.
DOE, CERN and Microsoft Research have teamed up to make CERN multimedia accessible through the ScienceCinema multimedia search engine (see the press release). CERN is one of the world’s leading particle physics laboratories and has its headquarters in Geneva. Now, in addition to DOE R&D multimedia, CERN videos are every word searchable, delivering exceptionally precise and time-saving results. ScienceCinema was developed by the DOE Office of Scientific and Technical Information (OSTI) to make multimedia of some of DOE’s most exciting research more visible to researchers and the public.
National Endowment for the Arts Chairman Rocco Landesman today announced the latest round of NEA funding for Fiscal Year 2011 totaling more than $88 million awarded through 1,145 grants to not-for-profit national, regional, state, and local organizations nationwide.
The National Endowment for the Arts (NEA) today announced that 36 nonprofit, professional theater companies in 21 states plus the District of Columbia will receive grants of $25,000 each to participate in Shakespeare for a New Generation.
Original release date: May 18, 2011 | Last revised: February 06, 2013
Children present unique security risks when they use a computer—not only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can dramatically reduce the threats.
What unique risks are associated with children?
When a child is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. You need to consider these characteristics when determining how to protect your data and the child.
You may think that because the child is only playing a game, or researching a term paper, or typing a homework assignment, he or she can’t cause any harm. But what if, when saving her paper, the child deletes a necessary program file? Or what if she unintentionally visits a malicious web page that infects your computer with a virus? These are just two possible scenarios. Mistakes happen, but the child may not realize what she’s done or may not tell you what happened because she’s afraid of getting punished.
Online predators present another significant threat, particularly to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick other users (see Avoiding Social Engineering and Phishing Attacks for some examples). Adults often fall victim to these ploys, and children, who are usually much more open and trusting, are even easier targets. Another growing problem is cyberbullying. These threats are even greater if a child has access to email or instant messaging programs, visits chat rooms, and/or uses social networking sites.
What can you do?
- Be involved – Consider activities you can work on together, whether it be playing a game, researching a topic you had been talking about (e.g., family vacation spots, a particular hobby, a historical figure), or putting together a family newsletter. This will allow you to supervise your child’s online activities while teaching her good computer habits.
- Keep your computer in an open area – If your computer is in a high-traffic area, you will be able to easily monitor the computer activity. Not only does this accessibility deter a child from doing something she knows she’s not allowed to do, it also gives you the opportunity to intervene if you notice a behavior that could have negative consequences.
- Set rules and warn about dangers – Make sure your child knows the boundaries of what she is allowed to do on the computer. These boundaries should be appropriate for the child’s age, knowledge, and maturity, but they may include rules about how long she is allowed to be on the computer, what sites she is allowed to visit, what software programs she can use, and what tasks or activities she is allowed to do.
You should also talk to children about the dangers of the internet so that they recognize suspicious behavior or activity. Discuss the risks of sharing certain types of information (e.g., that they’re home alone) and the benefits to only communicating and sharing information with people they know (see Using Instant Messaging and Chat Rooms Safely, Staying Safe on Social Network Sites, and the document Socializing Securely: Using Social Networking Services for more information). The goal isn’t to scare them, it’s to make them more aware. Make sure to include the topic of cyberbullying in these discussions (see Dealing with Cyberbullies for more information).
- Monitor computer activity – Be aware of what your child is doing on the computer, including which websites she is visiting. If she is using email, instant messaging, or chat rooms, try to get a sense of who she is corresponding with and whether she actually knows them.
- Keep lines of communication open – Let your child know that she can approach you with any questions or concerns about behaviors or problems she may have encountered on the computer.
- Consider partitioning your computer into separate accounts – Most operating systems give you the option of creating a different user account for each user. If you’re worried that your child may accidentally access, modify, and/or delete your files, you can give her a separate account and decrease the amount of access and number of privileges she has.
If you don’t have separate accounts, you need to be especially careful about your security settings. In addition to limiting functionality within your browser (see Evaluating Your Web Browser’s Security Settings for more information), avoid letting your browser remember passwords and other personal information (see Browsing Safely: Understanding Active Content and Cookies). Also, it is always important to keep your virus definitions up to date (see Understanding Anti-Virus Software).
- Consider implementing parental controls – You may be able to set some parental controls within your browser. For example, Internet Explorer allows you to restrict or allow certain websites to be viewed on your computer, and you can protect these settings with a password. To find those options, click Tools on your menu bar, select Internet Options, choose the Content tab, and click the Enable… button under Content Advisor.
There are other resources you can use to control and/or monitor your child’s online activity. Some ISPs offer services designed to protect children online. Contact your ISP to see if any of these services are available. There are also special software programs you can install on your computer. Different programs offer different features and capabilities, so you can find one that best suits your needs.
The following websites offer additional information about protecting children online:
- GetNetWise – http://kids.getnetwise.org/
- StaySafeOnline – http://www.staysafeonline.org/
- Stop. Think. Connect. – http://www.dhs.gov/stopthinkconnect
Authors: Mindi McDowell and Allen Householder
NEA Chairman’s prepared statement on the NEA’s FY 12 budget request before the House of Representatives Appropriation Subcommittee on Interior, Environment, and Related Agencies.
Howard Shalwitz talks about the theater company’s production of the Pulitzer Prize-winning play by Bruce Norris, Clybourne Park.
Twenty-one arts journalists from 13 states have been chosen to participate as fellows in USC Annenberg’s seventh National Endowment for the Arts (NEA) Arts Journalism Institute in Theater and Musical Theater.
Time and Money: Using Federal Data to Measure the Value of Performing Arts Activities is a new research note from the National Endowment for the Arts that looks at the value of the arts in three ways: time spent on arts activities; organizational revenue and expenses; and direct consumer spending. A particular focus on performing arts data provides consistency across these three measurements.
The great jazz writer Gary Giddins talks about the great jazz legend Duke Ellington.
Poet Cristin O’Keefe Aptowicz talks about slam poetry and community.
From a competitive field of more than 365,000 students nationwide, 16-year-old Youssef Biaz of Auburn, Alabama, received the title of 2011 Poetry Out Loud National Champion at the National Finals held in Washington, DC on Friday, April 29, 2011.
OSTI mobile http://m.osti.gov/ , the mobile application that previously searched Information Bridge, has been upgraded. Now your Android, Blackberry or iPhone will give you results from a number of OSTI Databases, including Energy Citations Database, Information Bridge, ScienceCinema, DOepatents and DOE Green Energy. Narrow your search by document type including multimedia and standard options, download and email results. Get the OSTIblog, twitter, Facebook, videos, and news.
Energy Technology programs are offered now at Arapahoe Community College:
- Solar Photovoltaic Systems Technician Certificate
- Solar Thermal System Technician Certificate
- Energy Analyst (Auditor) Certificate
- Construction Supervision AAS Degree
- LEED Exam Preparation