Skip to main content

Home/ Literacy with ICT/ Group items tagged juxtaposer

Rss Feed Group items tagged

John Evans

Juxtaposer: The Best Layering App Ever | Photojojo - 5 views

  •  
    "Want to be a game piece in Candyland? Want to ride a roller coaster down the Rocky Mountains? Now you can do it all! … Well, you can make it look like you did it all. Juxtaposer is the best app for creating fun photomontages. Cut out a piece of one photo and stick it onto another. We can't stop playing with it! We're going to show you the ins and outs of this app and turn you into a pro user. Because everyone needs to know how to make a photo of themselves swimming in a tub of ice cream."
John Evans

Middle School Maker Journey: Recapping the Capstones | Edutopia - 2 views

  •  
    "Why is it that sometimes we only see the extremes in our work? Picture your strongest lessons, activities, and projects juxtaposed against ones that just didn't work, and that's how it's been so far with our Digital Shop capstone projects. Some experiences make me want to high-five the entire class all at once. Others deserve an epic facepalm. As of this writing, we still have a month of school left. How will the remaining capstones go? What have we learned in the process? Can we "fail up" and finish strong, sending kids into summer vacation with school-year memories that will last forever? As I explained in my April post, I wanted the capstone projects to: Be genuine design thinking experiences. Allow kids to showcase the skills and dispositions they worked to acquire all year. Be based on and help people from the community and the world. The results have been mixed, as this post will illustrate."
John Evans

JuxtaposeJS - Northwestern University Knight Lab - 1 views

  •  
    Frame comparisons made easy
tech vedic

Computer security outlook: Online identity theft and juxtaposed security initiatives - 0 views

  •  
    E-commerce, gaming, and social networking sites are grabbing the maximum attention, where you knowingly, or sometimes even unknowingly submit your personal information. And, Internet perpetrators are taking advantage of the pervasive Internet, people's growing dependencies on the Web, and addiction thereof. Thus, what you share on the Web, and with whom you share is an area of concern.
1 - 4 of 4
Showing 20 items per page