Thứ Bảy, 4 tháng 4, 2015

EASTER IS COMING...

When referring to the Easter season, we can not fail to mention the egg hunt game.

The egg hunt is a game during which decorated eggs, real hard-boiled ones or artificial ones filled with chocolate candies in various sizes, are hidden for children to find indoors and outdoors.

What could be more wonderful when you can enjoy with family, friends and your children during this Easter with an egg hunt on Seek&Spot app. You can freely create hints and make the game become more interesting with tasks to lead the players to positions having the hidden eggs. Content of the hints and tasks can be based on the historical story of Easter. From there, children can have fun as well as learning with Seek&Spot app.

When the hunt is over, prizes may be given to the one who has  the largest number of eggs collected. Real eggs may further be used in egg tapping contests.

Note: Make sure that Eggs are placed with varying degree of concealment, to accommodate children of varying ages.


Thứ Sáu, 3 tháng 4, 2015

GIVE YOU ABILITY TO THINK DIFFERENT #itk2015

DRESCRIPTION

Nowadays, technology solution has became the most popular choice for teachers who want their pupils to get the most effective learning. However, it also require significant amount of teacher’s time and effort in adoption. Interactive Technology in Educaiton, ITK 2015 exhibition, will be a large opportunity to explores new approaches of technology adoption and content creation within elementary-level education.


In this exhibition, we’ll introduce the concept of "new find and seek apps", which is a perfect combination of the traditional games of "hide and seek" and "scavenger hunt". In addition, we integrated a information transmission feature - InforSpots. The information of the object can be appear in the form of text, images, voice, and/or map location. All information is encapsulated in a QR code code that the teachers can create them. Accordingly, pupils can have fun learning, promote all exploring abilities as well as teamwork. During the exhibition, we will take you from surprise to other surprise that Seek&Spot app offer. Come to our 311B booth and experience!
 BOOTH VISITING TIME
Thursday, 16th April, 2015           9am – 5pm
Friday, 17th April, 2015                 9am – 3pm







VENUE AND REGISTRATION
The Interactive Technology in Education 2015 conference (ITK 2015) is the largest
conference in Finland related to information and communication technology in educational
use.
The exhibition will take place from Wednesday 15th April 2015 to Friday 17th April 2015 at
Hotel Rantasipi Aulanko in Hämeenlinna. You could look for more information about
exhibition following this link









Join with us at Facebook: SeeknSpot

Thứ Tư, 4 tháng 2, 2015

5 WAYS TO PROTECT YOUR SMARTPHONE FROM MALWARE



In the U.S. mobile malware rates jumped 75 percent in 2014 from 2013, according to a report published Thursday by the mobile security firm Lookout. (The report, which was based on the firm's 60 million users, reflects the number of devices that were attacked, but not infected because they had installed anti-virus software protection.)

Now that we’ve identified the causes and challenges associated with mobile malware, how do you prevent it? By taking back control of your mobile devices and their applications.
Here are 5 ways for securing your mobile users and preventing mobile malware infections. 

1. Protect Your Phone with a Password

It's a simple thing to do, yet so many don't. Using a password is the easiest thing you can do to protect your phone from spying eyes. Having a strong password with several characters and even capitalized letters should be a number one priority. Having a simple password makes it easy for hackers to quickly access and steal your information. In addition, smartphone users are making it simple for thieves by staying signed in to their online bank accounts, social networks and other applications that store personal data. When you are finished accessing your personal accounts online, make sure to log out. This is particularly important if you are using online banking. 

2. Research apps before you download them

You should only permit the installation of apps from trusted sources, such as Google Play and Apple App Store. Also, the developers' names, "Kingmall2010" and "we20090202" among them, are dead giveaways. Clearly these guys aren't on the up and up. So be careful before you download; if it's not a company you recognize, do some research before letting that app live on your phone. Check out the ratings and reviews, and look at the app's permissions very closely— For example, there's no reason for a wallpaper app to have access to your personal data. 

3. Don't View Sensitive Information on Public Wi-Fi

We have all experienced the joys and the benefits of free, public Wi-Fi, but unfortunately there are several drawbacks that come along with this convenient aid. On a public Wi-Fi connection, it is easy for someone to hack into your data. Many public Wi-Fi areas are not encrypted and are prime targets for hackers to access information on your computer or smartphone. If you are accessing any type of personal information such as your bank account, social network pages or even email accounts, be cautious. If possible, avoid any type of webpage or application that can identify you. 

4. Don’t jailbreak/root your phone

To “jailbreak” or to “root” means to gain full access to the operating system and features. This also means breaking the security model and allowing all apps, including malicious ones, to access the data owned by other applications. You should consider the needs and abilities before deciding to do this

5. Install a Mobile Security App

If you're already doing numbers 1-4 on this list, you probably don't really need to take this extra step. After all, mobile OSes are inherently more secure than their PC analogues, and apps are more isolated from each other. However, installing a security app (from a trusted source, of course) can't hurt, the apps are often free, and there can be extra benefits as well. For example, remote locking and wiping if your smartphone lost or stolen, automatically saves the last location of your device before it runs out of battery, get an email with a photo and location when your device is in wrong hands, protect yourself from risky app and prying eyes, and Wi-fi and web safety,...

Learn more at Facebook: FromLabs