http://www.instructables.com/id/How-to-make-bluetooth-music-enable-hearing-protect/
Computers and Internet
Embed YouTube as an Audio Player
Learn how to turn the standard YouTube video player into an audio player and embed it in your website using simple CSS.
A popular option would be that you extract the audio portion of that YouTube video and then use the Google MP3 player to embed that MP3 fil into your website. This will work but YouTube is very likely to have a problem with your approach.
The other approach could be CSS based where you embed the regular YouTube video player and then use the magic of CSS styles to hide the video inside the embedded player. See demo:
This internally renders the YouTube player using the IFRAME player and should therefore work on both desktop (Flash) and mobile (HTML5) browsers.
Without boring you with the technical details, here’s the little HTML code that turn the YouTube video player into an audio player. Simply replace the youtubeID with the ID of your YouTube video and you are done.
youtubeID?rel=0"> </iframe> </div> </div>
The YouTube logo inside then player, when clicked, will transport you to the original video hosted on the YouTube website.
Mobile Healthcare Faces The Future [Infographic]
Published on ReadWrite | shared via feedly mobile
The Mobile Revolution continues to change how industry after industry goes about day-to-day business. Yet one industry has been surprisingly slow to embrace the benefits of mobile: healthcare. Many observers find that strange, since healthcare could clearly benefit from the power of smartphones and tablets attached to the cloud.
Several things have slowed adoption of mobile in healthcare. Antiquated policies designed for a different era have been a major factor. For instance, what does it mean to be HIPAA compliant in a mobile world? HIPAA regulations rule how healthcare practitioners can store and transfer data on patients to protect both the privacy of the patient and the liability to doctors and nurses. HIPAA regulations are fairly complex and rigid (for a good reason, to be sure) and have scared off some mobile healthcare (mHealth) startups – at least until HIPAA can be updated to reflect the change in the technological landscape.
There’s also the question of culture. For decades, the primary patient interface for doctors, technicians and nurses has been the paper chart attached to a clipboard. Digitizing of patient records is a long, arduous process that many clinics have declined to undertake. Doctors face significant blowback from administrators sitting in front of bookshelves crammed full manila folders of patient histories.
(On a trip to my physician’s office a couple years back, I asked him if he used a smartphone to make his life easier. He showed me his BlackBerry and an app that helps him find the appropriate prescription for certain maladies. I asked him if he could digitize his entire file system and carry around an iPad or some such device to make his life easier. “I would love to,” he told me. “But I would lose half my staff if I ever changed how the system works.” )
We are starting to see progress in mHealth adoption: According to researchers, 62% of doctors use a tablet in some shape or form and 71% of nurses use a smartphone at work. The mHealth industry is forecast to be a $11.8 billion market by 2018.
Mobile healthcare is about more than just how doctors and nurses operate on a day-to-day basis. Mobile technology promises to contribute to wellness, preventative care, personal health records, communication with physicians, diet tracking, prescription reminders and many other health-related improvements. For instance, 30% of smartphone users are expected to use wellness apps in one form or another by 2015. By that year, analysts predict there will be nearly two billion smartphone users on the planet. You do the math.
Check out this infographic from mHeath consultancy [x]Cube Labs for a cross section of the mHealth industry, where it has been and how it can help healthcare providers and consumers alike.
feedly. feed your mind. http://www.feedly.com
As adults, it can be hard to see how something that looks as frivolous as a MySpace page can be used to intimidate. Unfortunately, for children across the country, it’s hardly that simple, benign, or easy to ignore. This chapter intends to illuminate the very real and growing impact of harassment and intimidation that has taken on a whole (completely) new depth via texting, instant messaging, and social-networking sites. According to iSafe.org, cyber-bullying is harassment that takes place during online interaction, including but not limited to:
- Flaming—Sending a threatening, angry, rude, or obscene message to an individual via e-mail or text message, or to an online group, such as chat room.
- Harassment—Repeatedly sending a person offensive messages, again via e-mail, text messages, or to and online group.
- Denigration—Sending or posting harmful, untrue statements about a person to other people, including the creation of a website or page intended to mock a person.
- Impersonation—Pretending to be someone else and sending or posting material that makes that person look bad or places that person in potential danger; this also includes using someone’s screen name and pretending to be them.
- Outing and trickery—Sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images; engaging in tricks to solicit embarrassing information that is public.
- Exclusion—Actions that specifically and intentionally exclude a person from an online group. (Kelsey, 2007, p. 109)
Anything in the above writing in ( ) has been modified by Safety First.
The about notes from this book are the insights and collective knowledge of Candice M. Kelsey who has earned her M.A. from Loyola Marymount University. As a co-founder of a private high school in Santa Monica, she has an inside view on teen and pre-teen development through the years as the Internet has evolved with the school and students. This writing, added to our "Safety First", gives perimeters to start understanding what teens and pre-teens are facing in Cyber-world; and in turn, recognize the real-world affect that ripple into each world. Cyber-Bullying is a subject that adults need to become responsible for; as a result, help teens and pre-teens defend themselves from this outburst of idiocy. Safety First appreciates any comments that could help protect people from Cyber-Bullying or help adult determine the signs of Cyber-Bullying. Please feel free to comment. Safety First would also like to hear any real cases and steps taken to deflect the invasion of our teens and pre-teens wired-world dangers. Your knowledge or insight is important to Safety First, teens, and per-teens as they develop in the abrasive culture that encompasses them.
Reference:
Kelsey, C. M. (2007). Generation MySpace—Helping Your Teen Survive Online Adolescence. New York: Marlowe & Company
Post By: Safety First
Posted by Eli Lucas, May 13, 2008
One of Onsite Computer’s clients noticed several spurious Visa charges o a recent statement. The date of the charges coincided with a business trip where he used a public PC at a coffee shop. Obviously, his Visa account was compromised, and this is a regular occurrence when people who use public computers are not careful with personal information.
In order to avoid potential problems, Onsite advises the following:
- Avoid entering personal info on public computers. There are several varieties of software that can record your keystrokes, including user ids, passwords, account numbers—anything you input into the PC.
- Be aware of anyone watching you activities. Although it is tough to visually follow a user’s keystrokes, someone (with the) intent on stealing you information will resort to all sorts of tricks to record PC activity. We have heard of micro-cameras used to record personal information at some public PCs (or ATMs and store Interact machines).
- Do not leave the public PC unattended and logout if you leave the PC. This seems like common sense; however, people sometimes forget prudent practices when harried in an airport or other public places.
- Delete you Internet history, temporary files, and cookies buy using the Tools, Internet Options, Browsing History.
- Do not save your passwords when prompted.
Onsite in New Orleans hopes these guidelines will help prevent your personal information from falling into the wrong hands when using a public PC.