Skip to main content

Home/ beyondwebct/ Group items tagged basics

Rss Feed Group items tagged

Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

What we learned from 5 million books | Video on TED.com - 0 views

    • Barbara Lindsey
       
      From YouTube version of this talk: "[Google's digtized books] are very practical and extremely awesome." Erez Lieberman Aiden and Jean-Baptiste Michel from Harvard University use the 15 million books scanned and digitized by Google to show how a visual and quantitative analysis of text can provide insights about fields as diverse as lexicography, the evolution of grammar, collective memory, the adoption of technology, the pursuit of fame, censorship, and historical epidemiology.
  • ELA: There are more sobering notes among the n-grams. For instance, here's the trajectory of Marc Chagall, an artist born in 1887. And this looks like the normal trajectory of a famous person. He gets more and more and more famous, except if you look in German. If you look in German, you see something completely bizarre, something you pretty much never see, which is he becomes extremely famous and then all of a sudden plummets, going through a nadir between 1933 and 1945, before rebounding afterward. And of course, what we're seeing is the fact Marc Chagall was a Jewish artist in Nazi Germany. Now these signals are actually so strong that we don't need to know that someone was censored. We can actually figure it out using really basic signal processing. Here's a simple way to do it. Well, a reasonable expectation is that somebody's fame in a given period of time should be roughly the average of their fame before and their fame after. So that's sort of what we expect. And we compare that to the fame that we observe. And we just divide one by the other to produce something we call a suppression index. If the suppression index is very, very, very small, then you very well might be being suppressed. If it's very large, maybe you're benefiting from propaganda.
  • Now when Google digitizes a book, they put it into a really nice format. Now we've got the data, plus we have metadata. We have information about things like where was it published, who was the author, when was it published. And what we do is go through all of those records and exclude everything that's not the highest quality data. What we're left with is a collection of five million books, 500 billion words, a string of characters a thousand times longer than the human genome -- a text which, when written out, would stretch from here to the Moon and back 10 times over -- a veritable shard of our cultural genome.
  • ...4 more annotations...
  • we're going to release statistics about the books. So take for instance "A gleam of happiness." It's four words; we call that a four-gram. We're going to tell you how many times a particular four-gram appeared in books in 1801, 1802, 1803, all the way up to 2008. That gives us a time series of how frequently this particular sentence was used over time. We do that for all the words and phrases that appear in those books, and that gives us a big table of two billion lines that tell us about the way culture has been changing.
  • You might also want to have a look at this particular n-gram, and that's to tell Nietzsche that God is not dead, although you might agree that he might need a better publicist.
  • JM: Now you can actually look at the distribution of suppression indexes over whole populations. So for instance, here -- this suppression index is for 5,000 people picked in English books where there's no known suppression -- it would be like this, basically tightly centered on one. What you expect is basically what you observe. This is distribution as seen in Germany -- very different, it's shifted to the left. People talked about it twice less as it should have been. But much more importantly, the distribution is much wider. There are many people who end up on the far left on this distribution who are talked about 10 times fewer than they should have been. But then also many people on the far right who seem to benefit from propaganda. This picture is the hallmark of censorship in the book record.
  • ELA: So culturomics is what we call this method. It's kind of like genomics. Except genomics is a lens on biology through the window of the sequence of bases in the human genome. Culturomics is similar. It's the application of massive-scale data collection analysis to the study of human culture. Here, instead of through the lens of a genome, through the lens of digitized pieces of the historical record. The great thing about culturomics is that everyone can do it. Why can everyone do it? Everyone can do it because three guys, Jon Orwant, Matt Gray and Will Brockman over at Google, saw the prototype of the Ngram Viewer, and they said, "This is so fun. We have to make this available for people." So in two weeks flat -- the two weeks before our paper came out -- they coded up a version of the Ngram Viewer for the general public. And so you too can type in any word or phrase that you're interested in and see its n-gram immediately -- also browse examples of all the various books in which your n-gram appears.
  •  
    fall 2012 syllabus
Barbara Lindsey

Basics · Mightybell - 0 views

  • By directly defining in plain language what people will get out of your Experience and how it will make them smarter, more interesting, survive in the Amazon, increasingly witty, or a more competitive athlete in the title of your Experience, you are one step closer to creating a compelling Experience
Barbara Lindsey

How to Use QR Codes in Student Projects - SimpleK12 - 0 views

  •  
    Some basic ideas for using QR Codes for student/parent resources
Barbara Lindsey

If San Francisco Crime were Elevation | Doug McCune - 0 views

  • Really nice. Be great to see the two combined – heatmaps and topography or atleast some kind of colour banding added to the topography. That would open up all kinds of possibilities – you could slice horizontally along the bands and create layers of different ranges. In fact mixing colour and topography would also give you a way of showing two sets of data concurrently – topography for prostitution and some kind of colour banding for wealth for example.
  • Makes the numbers come alive. G
  • Brilliant work! Can you cross this data with the physical typography? I’ve always been curious if safer neighborhoods are uphill.
  • ...5 more annotations...
  • It would be interesting to pull the data in from previous decades and see how the elevation has changed in different areas.
  • @adrian – it’s just raw totals, grouped geographically. These aren’t scientific by any means, I basically took the underlying pattern and extruded it out and smoothed it a bit to make it look “pretty”. But basically each image is the aggregate numbers for a single year of crime data.
  • @richard – yes, there is some smoothing in effect, which means that the ridge along Shotwell St (for the prostitution map) is indeed a bit smoothed between peaks. That’s not to say that there are only two peaks at Shotwell and 19th and Shotwell and 17th. There are incidents in between as well, but the big peaks at those major intersections does mean that the ridge between them appears higher than the actual incidents along those blocks support. A lot of people have commented on the usefulness of maps like these. I want to stress once again: this was done as an art project much more than a useful visualization. My goal was not to provide useful information that one could act on.
  • “one trick pony. these maps add nothing of value to a standard color plot.” I disagree: allowing for a third dimension of elevation makes the reality of concentration clearer – and half the point of crime mapping is to measure concentration, not simply “intensity.”
  • Great idea and nice work on the graphics, but there are at least three improvements you should make to reveal *true* patterns. Forgive me if you already did these. 1) Availability bias – normalize for population density (i.e. per capita activity) 2) Sampling bias – normalize for the number of cops on the beat (geographic and crime type) 2) Frame bias – break it up by daytime and night time
  •  
    Visual representation of various crime stats from San Francisco
Barbara Lindsey

An Interview with Michael Wesch - Part 1 of 3 | November Learning - 0 views

  •  
    This episode is the first of a three part conversation between Alan November and Michael Wesch, Assistant Professor of Cultural Anthropology and Digital Ethnography at Kansas State University. In this segment, the two discuss the need for teaching social responsibility to students and what important basic skills students and teachers need to know. Additionally, the two discuss whether students are having a loss or gain of identity by working online.
Barbara Lindsey

How to Use Google Documents: Video Series | eHow Videos - 0 views

  •  
    This might be good for someone who needs step by step guidance in using the basic features of Google docs.
Barbara Lindsey

Education/EduCourse/Announcement - MozillaWiki - 0 views

  •  
    The Mozilla Foundation, in collaboration with ccLearn/Creative Commons and the Peer 2 Peer University, launches a practical online seminar on open education. This six week course is targeted at educators who will gain basic skills in open licensing, open technology, and open pedagogy; work on prototypes of innovative open education projects; and get input from some of the world leading innovators along the way.
Barbara Lindsey

Curriculum21 - Annotexting - 0 views

  • Students are asked to read closely, cite evidence, and make evidence based inferences when they read. They are expected to deepen their learning by valuing textual evidence and reading critically.  Annotating text is one way students can cite textual evidence, infer and deepen meaning as they read..
  • Annotations make thinking visible for teachers and students. We can use the words and features of a text to better comprehend it, ask questions, and note our thoughts while reading. One goal of comprehension is that students will be proficient annotators of texts to understand more deeply by interacting and making thinking transparent while they read.
  • There are many reasons to ask students to annotate text: for basic comprehension, to show evidence of conceptual understanding, to show what is implied, to identify the claims in an argument, to read like a writer and identify characteristics of genre, to notice the nuance of language…and many other reasons.   Giving guidance as to what we want students to annotate for will be beneficial for the reader. Otherwise, they will annotate everything that comes to mind, and the work may not be helpful to the reader or the teacher.
  • ...2 more annotations...
  • Students submit their annotations via their smart phones or other digital devices, and then analyze each other’s notations collectively.  They could be looking for main ideas, thematic and literary elements, or big ideas from the work.   They could be looking for evidence of connections to other texts, their own experiences, or world issues. They could simply be searching for meaning to support them when reading complex texts. In addition, students could reflect on the collective evidence as a metacognitive activity to assess their own learning.  Perhaps the collaborative exercise raised new questions for them or offered them new ways of thinking about the text. Perhaps there is something else the student wants or needs to know?
  • What would have changed in the interpretation of this poem if our perspectives were woven together? Does the collaborative process of conversation yield a greater product? Does the thinking extend when multiple perspectives are mixed? Does the evidence yield to strategic thinking when multiple viewpoints are involved?
Barbara Lindsey

Stanford Ushers In The Age Of Bookless Libraries : NPR - 0 views

  • For years, students have had to search through volume after volume of books before finding the right formula — but no more. Josephine says that "with books being digitized and available through full text search capabilities, they can find that formula quite easily."
  • Keller expects that, eventually, there won't be any books on the shelves at all.
  • Given the nature of engineering, that actually comes in handy. Engineering uses some basic formulas but is generally a rapidly changing field — particularly in specialties such as software and bioengineering. Traditional textbooks have rarely been able to keep up.
  • ...2 more annotations...
  • "It allows our faculty to change examples," he says," to put in new homework problems ... and lectures and things like that in almost a real-time way.
  • According to a survey by the Association of Research Libraries, American libraries are spending more of their money on electronic resources and less on books.
Barbara Lindsey

Toolbox or Trap? Course Management Systems and Pedagogy (EDUCAUSE Quarterly) | EDUCAUSE... - 0 views

  • Campuses have adopted these programs on a wide scale, yet few studies have looked at how the design and use of a CMS affects pedagogy, and instructors rarely discuss how a CMS affects their teaching.
    • Barbara Lindsey
       
      Discuss in class.
  • Decisions about which learning software to use on campus are often made by campus technologists and administrators rather than faculty.
    • Barbara Lindsey
       
      Not surprisingly, this also is the case at UCONN.
  • The construction of the course syllabus, a natural beginning point for most instructors, is a good example of how the software imposes limitations. When they first enter a CMS, new instructors see the default buttons of the course menu, which are based on type rather than purpose: Announcements, Course Content, Discussion, even Syllabus.
  • ...8 more annotations...
  • The default organization of the CMS forces them to think in terms of content types instead, breaking the natural structure of the semester.
  • In addition to a counterintuitive organizational scheme, integrated commercial systems have a built-in pedagogy, evident in the easiest-to-use, most accessible features. The focus on presentation (written documents to read), complemented by basic "discussion" input from students, is based on traditional lecture, review, and test pedagogy. This orientation is very different from the development of knowledge through a constructivist, learner-centered, or inquiry-based approach, which a number of faculty use successfully in the classroom.
  • But at the novice level, the system simply does not encourage such customization. To be able to modify the CMS to employ alternative teaching methods, instructors must have a well-developed sense of what is possible in the online environment before approaching the course design process—a perspective many do not have when they first start teaching online. When presented with a list of options, most people typically choose one option rather than question the list itself.
  • Most faculty do not use the web either extensively or intensively in their own work, and those who aren't "into technology" will quickly find themselves overwhelmed by a CMS.
  • Even after several years of working with a CMS, faculty requests for help tend to focus on what the technology can do rather than how their teaching and learning goals can be achieved.
    • Barbara Lindsey
       
      Important distinction.
  • An instructor seeking an easy way to post word-processed documents, enter grades, receive papers and assignments through a digital dropbox, and run a traditional threaded discussion board will tend to show great satisfaction with using a CMS.4 Those who tax the system more, and use the most complex features, show lower levels of satisfaction. In addition, after spending months creating material and quizzes in a proprietary system, faculty rightly panic at the idea of "moving everything" to another system. The big systems simply do not allow for easy export, and no one wants to do all that work over again. It is much easier to simply declare satisfaction with things the way they are.
  • There are, of course, alternatives to these hampering systems, and you don't have to be a programmer or Internet expert to use them.
  • Web 2.0 applications that encourage social construction of knowledge (Wikispaces, BubbleShare, Ning) are freely available and may provide more creative instructors with better options than any LMS currently available. Such programs make possible the creation of one's own mini-CMS, cobbled together out of programs that fit with the instructor's methodology. In these cases, pedagogy comes first—the tools can be used to build the courses we want to teach.
  •  
    Discuss this in class
Barbara Lindsey

Fishing / Fish Nuggets » CogDogBlog - 0 views

  • Course Management Systems are huge fish nugget factories. And we spend a lot of time, effort, money keeping the assembly lines moving. Fishing? Most things web 2.0.
    • Barbara Lindsey
       
      How can we swim against the stream when university administration pays millions in initial and on-going costs (renewal fees, support staff, 'training sessions') for these lock-step CMSs and actively promote their use and discourage or prevent the use of flexible, interactive and user-defined social networking environments?
  • Most of the faculty that reach out to me are really just asking for tech support. They want to know how to perform certain tasks in Blackboard. They want to know how to edit a web site. They don’t tend to ask the bigger questions: what is appropriate technology for me to use to achieve my goals, how should I use x to help my students learn.
  • I had tremendous latitude to explore and try new technologies
  • ...6 more annotations...
  • Do we foster an environment of “learned helplessness” among the faculty we support by most of our work being workshops on the tools rather than the craft?
    • Barbara Lindsey
       
      Why is it that so many educators don't get this?
  • And along these lines, I was part of some technology conversations with UBC faculty and I just relished watching my colleague Brian’s face contort when someone says, “how do I use twitter in my class?” He’d say in his sweet flip matter, “I am not going to answer that” — not because he doesn’t want to help, but because he wants to teach fishing, not toss them nuggets. You don’t find a freaking “job aid” that gives you a 8 step recipe to use twitter in your economics class– you spend some time in the environment, and let the affordances linger with your content area, and then maybe, you develop an idea that makes sense.
  • My thought is you do a lot of small things.
  • Toss ‘em something that might help on a personal level- be it flickr or doodle or diigo or heck, Blabberize.
  • it means less formal training, less workshops, and more learning by doing. It means using these tools a much as possible in our processes, so they become part of a fabric, not something strange and exotic.
    • Barbara Lindsey
       
      Yes--again, why is this such a difficult concept for educators?
  • They get so hung up on the basic that they can’t get into the cool stuff like expanding and applying their knowledge to more challenging problems. The same situation occurs with faculty. There are lots of folks out there…really…who don’t understand the Internet or servers or how web pages or email works or what the difference. For many folks, uploading links and icons and documents to Blackboard is a major accomplishment given their complete and total lack of understanding of the technological world. I am not even talking about understanding at the level of a techie but more an intuitive sense of how and why things work the way they do with technology.
  •  
    Save Bookmark
Barbara Lindsey

My School, Meet MySpace: Social Networking at School | Edutopia - 0 views

  • Months before the newly hired teachers at Philadelphia's Science Leadership Academy (SLA) started their jobs, they began the consuming work of creating the high school of their dreams -- without meeting face to face. They articulated a vision, planned curriculum, designed assessment rubrics, debated discipline policies, and even hammered out daily schedules using the sort of networking tools -- messaging, file swapping, idea sharing, and blogging -- kids love on sites such as MySpace.
  • hen, weeks before the first day of school, the incoming students jumped onboard -- or, more precisely, onto the Science Leadership Academy Web site -- to meet, talk with their teachers, and share their hopes for their education. So began a conversation that still perks along 24/7 in SLA classrooms and cyberspace. It's a bold experiment to redefine learning spaces, the roles and relationships of teachers and students, and the mission of the modern high school.
  • When I hear people say it's our job to create the twenty-first-century workforce, it scares the hell out of me," says Chris Lehmann, SLA's founding principal. "Our job is to create twenty-first-century citizens. We need workers, yes, but we also need scholars, activists, parents -- compassionate, engaged people. We're not reinventing schools to create a new version of a trade school. We're reinventing schools to help kids be adaptable in a world that is changing at a blinding rate."
  • ...11 more annotations...
  • It's the spirit of science rather than hardcore curriculum that permeates SLA. "In science education, inquiry-based learning is the foothold," Lehmann says. "We asked, 'What does it mean to build a school where everything is based on the core values of science: inquiry, research, collaboration, presentation, and reflection?'"
  • It means the first-year curriculum is built around essential questions: Who am I? What influences my identity? How do I interact with my world? In addition to science, math, and engineering, core courses include African American history, Spanish, English, and a basic how-to class in technology that also covers Internet safety and the ethical use of information and software. Classes focus less on facts to be memorized and more on skills and knowledge for students to master independently and incorporate into their lives. Students rarely take tests; they write reflections and do "culminating" projects. Learning doesn't merely cross disciplines -- it shatters outdated departmental divisions. Recently, for instance, kids studied atomic weights in biochemistry (itself a homegrown interdisciplinary course), did mole calculations in algebra, and created Dalton models (diagrams that illustrate molecular structures) in art.
  • This is Dewey for the digital age, old-fashioned progressive education with a technological twist.
  • computers and networking are central to learning at, and shaping the culture of, SLA. "
  • he zest to experiment -- and the determination to use technology to run a school not better, but altogether differently -- began with Lehmann and the teachers last spring when they planned SLA online. Their use of Moodle, an open source course-management system, proved so easy and inspired such productive collaboration that Lehmann adopted it as the school's platform. It's rare to see a dog-eared textbook or pad of paper at SLA; everybody works on iBooks. Students do research on the Internet, post assignments on class Moodle sites, and share information through forums, chat, bookmarks, and new software they seem to discover every day.
  • Teachers continue to use Moodle to plan, dream, and learn, to log attendance and student performance, and to talk about everything -- from the student who shows up each morning without a winter coat to cool new software for tagging research sources. There's also a schoolwide forum called SLA Talk, a combination bulletin board, assembly, PA system, and rap session.
  • Web technology, of course, can do more than get people talking with those they see every day; people can communicate with anyone anywhere. Students at SLA are learning how to use social-networking tools to forge intellectual connections.
  • In October, Lehmann noticed that students were sorting themselves by race in the lunchroom and some clubs. He felt disturbed and started a passionate thread on self-segregation.
  • "Having the conversation changed the way kids looked at themselves," he says.
  • "What I like best about this school is the sense of community," says student Hannah Feldman. "You're not just here to learn, even though you do learn a lot. It's more like a second home."
  • As part of the study of memoirs, for example, Alexa Dunn's English class read Funny in Farsi, Firoozeh Dumas's account of growing up Iranian in the United States -- yes, the students do read books -- and talked with the author in California via Skype. The students also wrote their own memoirs and uploaded them to SLA's network for the teacher and class to read and edit. Then, digital arts teacher Marcie Hull showed the students GarageBand, which they used to turn their memoirs into podcasts. These they posted on the education social-networking site EduSpaces (formerly Elgg); they also posted blogs about the memoirs.
Barbara Lindsey

Dr. Mashup; or, Why Educators Should Learn to Stop Worrying and Love the Remix | EDUCAU... - 0 views

  • A classroom portal that presents automatically updated syndicated resources from the campus library, news sources, student events, weblogs, and podcasts and that was built quickly using free tools.
  • Increasingly, it's not just works of art that are appropriated and remixed but the functionalities of online applications as well.
  • mashups involve the reuse, or remixing, of works of art, of content, and/or of data for purposes that usually were not intended or even imagined by the original creators.
  • ...31 more annotations...
  • hat, exactly, constitutes a valid, original work? What are the implications for how we assess and reward creativity? Can a college or university tap the same sources of innovative talent and energy as Google or Flickr? What are the risks of permitting or opening up to this activity?
    • Barbara Lindsey
       
      Good discussion point
  • Remix is the reworking or adaptation of an existing work. The remix may be subtle, or it may completely redefine how the work comes across. It may add elements from other works, but generally efforts are focused on creating an alternate version of the original. A mashup, on the other hand, involves the combination of two or more works that may be very different from one another. In this article, I will apply these terms both to content remixes and mashups, which originated as a music form but now could describe the mixing of any number of digital media sources, and to data mashups, which combine the data and functionalities of two or more Web applications.
  • Harper's article "The Ecstasy of Influence," the novelist Jonathan Lethem imaginatively reviews the history of appropriation and recasts it as essential to the act of creation.3
  • Lethem's article is a must-read for anyone with an interest in the history of ideas, creativity, and intellectual property. It brilliantly synthesizes multiple disciplines and perspectives into a wonderfully readable and compelling argument. It is also, as the subtitle of his article acknowledges, "a plagiarism." Virtually every passage is a direct lift from another source, as the author explains in his "Key," which gives the source for every line he "stole, warped, and cobbled together." (He also revised "nearly every sentence" at least slightly.) Lethem's ideas noted in the paragraph above were appropriated from Siva Vaidhyanathan, Craig Baldwin, Richard Posner, and George L. Dillon.
  • Reading Walter Benjamin's highly influential 1936 essay "The Work of Art in the Age of Mechanical Reproduction,"4 it's clear that the profound effects of reproductive technology were obvious at that time. As Gould argued in 1964 (influenced by theorists such as Marshall McLuhan5), changes in how art is produced, distributed, and consumed in the electronic age have deep effects on the character of the art itself.
  • Yet the technology developments of the past century have clearly corresponded with a new attitude toward the "aura" associated with a work of invention and with more aggressive attitudes toward appropriation. It's no mere coincidence that the rise of modernist genres using collage techniques and more fragmented structures accompanied the emergence of photography and audio recording.
  • Educational technologists may wonder if "remix" or "content mashup" are just hipper-sounding versions of the learning objects vision that has absorbed so much energy from so many talented people—with mostly disappointing results.
  • The question is, why should a culture of remix take hold when the learning object economy never did?
  • when most learning object repositories were floundering, resource-sharing services such as del.icio.us and Flickr were enjoying phenomenal growth, with their user communities eagerly contributing heaps of useful metadata via simple folksonomy-oriented tagging systems.
  • the standards/practices relationship implicit in the learning objects model has been reversed. With only the noblest of intentions, proponents of learning objects (and I was one of them) went at the problem of promoting reuse by establishing an arduous and complex set of interoperability standards and then working to persuade others to adopt those standards. Educators were asked to take on complex and ill-defined tasks in exchange for an uncertain payoff. Not surprisingly, almost all of them passed.
  • Discoverable Resources
  • Educators might justifiably argue that their materials are more authoritative, reliable, and instructionally sound than those found on the wider Web, but those materials are effectively rendered invisible and inaccessible if they are locked inside course management systems.
  • It's a dirty but open secret that many courses in private environments use copyrighted third-party materials in a way that pushes the limits of fair use—third-party IP is a big reason why many courses cannot easily be made open.
  • The potential payoff for using open and discoverable resources, open and transparent licensing, and open and remixable formats is huge: more reuse means that more dynamic content is being produced more economically, even if the reuse happens only within an organization. And when remixing happens in a social context on the open web, people learn from each other's process.
  • Part of making a resource reusable involves making the right choices for file formats.
  • To facilitate the remixing of materials, educators may want to consider making the source files that were used to create a piece of multimedia available along with the finished result.
  • In addition to choosing the right file format and perhaps offering the original sources, another issue to consider when publishing content online is the critical question: "Is there an RSS feed available?" If so, conversion tools such as Feed2JS (http://www.feed2JS.org) allow for the republication of RSS-ified content in any HTML Web environment, including a course management system, simply by copying and pasting a few lines of JavaScript code. When an original source syndicated with RSS is updated, that update is automatically rendered anywhere it has been republished.
  • Jack Schofield
  • Guardian Unlimited
  • "An API provides an interface and a set of rules that make it much easier to extract data from a website. It's a bit like a record company releasing the vocals, guitars and drums as separate tracks, so you would not have to use digital processing to extract the parts you wanted."1
  • What's new about mashed-up application development? In a sense, the factors that have promoted this approach are the same ones that have changed so much else about Web culture in recent years. Essential hardware and software has gotten more powerful and for the most part cheaper, while access to high-speed connectivity and the enhanced quality of online applications like Google Docs have improved to the point that Tim O'Reilly and others can talk of "the emergent Internet operating system."15 The growth of user-centered technologies such as blogs have fostered a DIY ("do it yourself") culture that increasingly sees online interaction as something that can be personalized and adapted on the individual level. As described earlier, light syndication and service models such as RSS have made it easier and faster than ever to create simple integrations of diverse media types. David Berlind, executive editor of ZDNet, explains: "With mashups, fewer technical skills are needed to become a developer than ever. Not only that, the simplest ones can be done in 10 or 15 minutes. Before, you had to be a pretty decent code jockey with languages like C++ or Visual Basic to turn your creativity into innovation. With mashups, much the same way blogging systems put Web publishing into the hands of millions of ordinary non-technical people, the barrier to developing applications and turning creativity into innovation is so low that there's a vacuum into which an entire new class of developers will be sucked."16
  • The ability to "clone" other users' mashups is especially exciting: a newcomer does not need to spend time learning how to structure the data flows but can simply copy an existing framework that looks useful and then make minor modifications to customize the result.19
    • Barbara Lindsey
       
      This is the idea behind the MIT repository--remixing content to suit local needs.
  • As with content remixing, open access to materials is not just a matter of some charitable impulse to share knowledge with the world; it is a core requirement for participating in some of the most exciting and innovative activity on the Web.
  • "My Maps" functionality
  • For those still wondering what the value proposition is for offering an open API, Google's development process offers a compelling example of the potential rewards.
    • Barbara Lindsey
       
      Wikinomics
  • Elsewhere, it is difficult to point to significant activity suggesting that the mashup ethos is taking hold in academia the way it is on the wider Web.
  • Yet for the most part, the notion of the data mashup and the required openness is not even a consideration in discussions of technology strategy in higher educational institutions. "Data integration" across campus systems is something that is handled by highly skilled professionals at highly skilled prices.
  • Revealing how a more adventurous and inclusive online development strategy might look on campus, Raymond Yee recently posted a comprehensive proposal for his university (UC Berkeley), in which he outlined a "technology platform" not unlike the one employed by Amazon.com (http://aws.amazon.com/)—resources and access that would be invaluable for the institution's programmers as well as for outside interests to build complementary services.
  • All too often, college and university administrators react to this type of innovation with suspicion and outright hostility rather than cooperation.
  • those of us in higher education who observe the successful practices in the wider Web world have an obligation to consider and discuss how we might apply these lessons in our own contexts. We might ask if the content we presently lock down could be made public with a license specifying reasonable terms for reuse. When choosing a content management system, we might consider how well it supports RSS syndication. In an excellent article in the March/April 2007 issue of EDUCAUSE Review, Joanne Berg, Lori Berquam, and Kathy Christoph listed a number of campus activities that could benefit from engaging social networking technologies.26
  • What might happen if we allow our campus innovators to integrate their practices in these areas in the same way that social networking application developers are already integrating theirs? What is the mission-critical data we cannot expose, and what can we expose with minimal risk? And if the notion of making data public seems too radical a step, can APIs be exposed to selected audiences, such as on-campus developers or consortia partners?
Barbara Lindsey

The Tempered Radical: Rework, Retrain, Rethink... - 0 views

  • Would we experience an educational revolution where children learned to create their own knowledge and make connections between classmates across continents?
    • Barbara Lindsey
       
      Exactly what Barbara Ganley envisioned for Middlebury, which said, thanks, but no thanks.
  • Would new discoveries be made by curious kids who were "unleashed" for the first time, free to explore? Or would classrooms remain teacher-paced and highly directed, with students exploring the same site on the same day at the same time as their peers?  Would we end up with far more Power Point presentations than any one child should ever produce?  Would computer use remain limited--as it so often is--to word processing and basic research?
    • Barbara Lindsey
       
      Well, everyone? What do our classrooms look like?
Barbara Lindsey

Convenience, Communications, and Control: How Students Use Technology | Resources | EDU... - 0 views

  • They are characterized as preferring teamwork, experiential activities, and the use of technology
  • Doing is more important than knowing, and learning is accomplished through trial and error as opposed to a logical and rule-based approach.2 Similarly, Paul Hagner found that these students not only possess the skills necessary to use these new communication forms, but there is an ever increasing expectation on their part that these new communication paths be used
  • Much of the work to date, while interesting and compelling, is intuitive and largely based on qualitative data and observation.
  • ...34 more annotations...
  • There is an inexorable trend among college students to universal ownership, mobility, and access to technology.
  • Students were asked about the applications they used on their electronic devices. They reported that they use technology first for educational purposes, followed by communication.
    • Barbara Lindsey
       
      All self-reported. Would have been powerful if could have actually tracked a representative sample and compared actual use with reported use.
  • presentation software was driven primarily by the requirements of the students' major and the curriculum.
  • Communications and entertainment are very much related to gender and age.
  • From student interviews, a picture emerged of student technology use driven by the demands of the major and the classes that students take. Seniors reported spending more time overall on a computer than do freshmen, and they reported greater use of a computer at a place of employment. Seniors spent more hours on the computer each week in support of their educational activities and also more time on more advanced applications—spreadsheets, presentations, and graphics.
  • Confirming what parents suspect, students with the lowest grade point averages (GPAs) spend significantly more time playing computer games; students with the highest GPAs spend more hours weekly using the computer in support of classroom activities. At the University of Minnesota, Crookston, students spent the most hours on the computer in support of classroom activities. This likely reflects the deliberate design of the curriculum to use a laptop extensively. In summary, the curriculum's technology requirements are major motivators for students to learn to use specialized software.
  • The interviews indicated that students are skilled with basic office suite applications but tend to know just enough technology functionality to accomplish their work; they have less in-depth application knowledge or problem solving skills.
  • According to McEuen, student technology skills can be likened to writing skills: Students come to college knowing how to write, but they are not developed writers. The analogy holds true for information technology, and McEuen suggested that colleges and universities approach information technology in the same way they approach writing.6
  • he major requires the development of higher-level skill sets with particular applications.
    • Barbara Lindsey
       
      Not really quantitative--self-reported data back by selected qualitative interviews
  • The comparative literature on student IT skill self-assessment suggests that students overrate their skills; freshmen overrate their skills more than seniors, and men overrate their skills more than women.7 Our data supports these conclusions. Judy Doherty, director of the Student Technologies Resource Group at Colgate University, remarked on student skill assessment, "Students state in their job applications that they are good if not very good, but when tested their skills are average to poor, and they need a lot of training."8
  • Mary Jane Smetanka of the Minneapolis–St. Paul Star Tribune reported that some students are so conditioned by punch-a-button problem solving on computers that they approach problems with a scattershot impulsiveness instead of methodically working them through. In turn, this leads to problem-solving difficulties.
  • We expected to find that the Net Generation student prefers classes that use technology. What we found instead is a bell curve with a preference for a moderate use of technology in the classroom (see Figure 1).
    • Barbara Lindsey
       
      More information needs to be given to find out why--may be tool and method not engaging.
  • It is not surprising that if technology is used well by the instructor, students will come to appreciate its benefits.
  • A student's major was also an important predictor of preferences for technology in the classroom (see Table 3), with engineering students having the highest preference for technology in the classroom (67.8 percent), followed by business students (64.3 percent).
  • Humanities 7.7% 47.9% 40.2
  • he highest scores were given to improved communications, followed by factors related to the management of classroom activities. Lower impact activities had to do with comprehension of classroom materials (complex concepts).
  • I spend more time engaged in course activities in those courses that require me to use technology.
  • The instructors' use of technology in my classes has increased my interest in the subject matter. 3.25 Classes that use information technology are more likely to focus on real-world tasks and examples.
  • Interestingly, students do not feel that use of information technology in classes greatly increases the amount of time engaged with course activities (3.22 mean).12 This is in direct contrast to faculty perceptions reported in an earlier study, where 65 percent of faculty reported they perceived that students spend more time engaged with course materials
  • Only 12.7 percent said the most valuable benefit was improved learning; 3.7 percent perceived no benefit whatsoever. Note that students could only select one response, so more than 12.7 percent may have felt learning was improved, but it was not ranked highest. These findings compare favorably with a study done by Douglas Havelka at the University of Miami in Oxford, Ohio, who identified the top six benefits of the current implementation of IT as improving work efficiency, affecting the way people behave, improving communications, making life more convenient, saving time, and improving learning ability.14
    • Barbara Lindsey
       
      Would have been good to know exactly what kinds of technologies were meant here.
  • Our data suggest that we are at best at the cusp of technologies being employed to improve learning.
  • The interactive features least used by faculty were the features that students indicated contributed the most to their learning.
  • he students in this study called our attention to performance by noting an uneven diffusion of innovation using this technology. This may be due, in part, to faculty or student skill. It may also be due to a lack of institutional recognition of innovation, especially as the successful use of course management systems affects or does not affect faculty tenure, promotion, and merit decisions
  • we found that many of the students most skilled in the use of technology had mixed feelings about technology in the classroom.
  • What we found was that many necessary skills had to be learned at the college or university and that the motivation for doing so was very much tied to the requirements of the curriculum. Similarly, the students in our survey had not gained the necessary skills to use technology in support of academic work outside the classroom. We found a significant need for further training in the use of information technology in support of learning and problem-solving skills.
  • Course management systems were used most by both faculty and students for communication of information and administrative activities and much less in support of learning.
  • In 1997, Michael Hooker proclaimed, "higher education is on the brink of a revolution." Hooker went on to note that two of the greatest challenges our institutions face are those of "harnessing the power of digital technology and responding to the information revolution."18 Hooker and many others, however, did not anticipate the likelihood that higher education's learning revolution would be a journey of a thousand miles rather than a discrete event. Indeed, a study of learning's last great revolution—the invention of moveable type—reveals, too, a revolution conducted over centuries leading to the emergence of a publishing industry, intellectual property rights law, the augmentation of customized lectures with textbooks, and so forth.
  • Both the ECAR study on faculty use of course management systems and this study of student experiences with information technology concluded that, while information technology is indeed making important inroads into classroom and learning activities, to date the effects are largely in the convenience of postsecondary teaching and learning and do not yet constitute a "learning revolution." This should not surprise us. The invention of moveable type enhanced, nearly immediately, access to published information and reduced the time needed to produce new publications. This invention did not itself change literacy levels, teaching styles, learning styles, or other key markers of a learning revolution. These changes, while catalyzed by the new technology, depended on slower social changes to institutions. I believe that is what we are witnessing in higher education today.
  • The institutions chosen represent a nonrepresentative mix of the different types of higher education institution in the United States, in terms of Carnegie class as well as location, source of funding, and levels of technology emphasis. Note, however, that we consider our findings to be instructive rather than conclusive of student experiences at different types of Carnegie institutions.
  • Qualitative data were collected by means of focus groups and individual interviews. We interviewed undergraduate students, administrators, and individuals identified as experts in the field of student technology use in the classroom. Student focus groups and interviews of administrators were conducted at six of the thirteen schools participating in the study.
Barbara Lindsey

Teaching in Social and Technological Networks « Connectivism - 0 views

  • Students are not confined to interacting with only the ideas of a researcher or theorist. Instead, a student can interact directly with researchers through Twitter, blogs, Facebook, and listservs. The largely unitary voice of the traditional teacher is fragmented by the limitless conversation opportunities available in networks. When learners have control of the tools of conversation, they also control the conversations in which they choose to engage.
  • Traditional courses provide a coherent view of a subject. This view is shaped by “learning outcomes” (or objectives).
  • This cozy comfortable world of outcomes-instruction-assessment alignment exists only in education. In all other areas of life, ambiguity, uncertainty, and unkowns reign.
  • ...21 more annotations...
  • However, in order for education to work within the larger structure of integrated societal systems, clear outcomes are still needed.
  • How can we achieve learning targets when the educator is no longer able to control the actions of learners?
  • I’ve come to view teaching as a critical and needed activity in the chaotic and ambiguous information climate created by networks. In the future, however, the role of the teacher, the educator, will be dramatically different from the current norm. Views of teaching, of learner roles, of literacies, of expertise, of control, and of pedagogy are knotted together. Untying one requires untying the entire model.
  • Most likely, a teacher will be one of the more prominent nodes in a learner’s network. Thoughts, ideas, or messages that the teacher amplifies will generally have a greater probability of being seen by course participants.
  • A curatorial teacher acknowledges the autonomy of learners, yet understands the frustration of exploring unknown territories without a map. A curator is an expert learner. Instead of dispensing knowledge, he creates spaces in which knowledge can be created, explored, and connected.
  • The curator, in a learning context, arranges key elements of a subject in such a manner that learners will “bump into” them throughout the course. Instead of explicitly stating “you must know this”, the curator includes critical course concepts in her dialogue with learners, her comments on blog posts, her in-class discussions, and in her personal reflections. As learners grow their own networks of understanding, frequent encounters with conceptual artifacts shared by the teacher will begin to resonate.
    • Barbara Lindsey
       
      Can you see this as a viable possibility?
  • When I first started learning about the internet (pre-web days), I felt like I had stepped into a alternate realm with its own norms of behaviour and conduct. Bulletin boards and chat rooms presented a challenging mix of navigating social protocols while developing technical skills. By engaging with these conversation spaces – and forming a few tentative connections with others – I was able to find a precarious foothold in the online medium.
  • Today’s social web is no different – we find our way through active exploration. Designers can aid the wayfinding process through consistency of design and functionality across various tools, but ultimately, it is the responsibility of the individual to click/fail/recoup and continue.
  • Social structures are filters. As a learner grows (and prunes) her personal networks, she also develops an effective means to filter abundance. The network becomes a cognitive agent in this instance – helping the learner to make sense of complex subject areas by relying not only on her own reading and resource exploration, but by permitting her social network to filter resources and draw attention to important topics. In order for these networks to work effectively, learners must be conscious of the need for diversity and should include nodes that offer critical or antagonistic perspectives on all topic areas. Sensemaking in complex environments is a social process.
  • Imagine a course where the fragmented conversations and content are analyzed (monitored) through a similar service. Instead of creating a structure of the course in advance of the students starting (the current model), course structure emerges through numerous fragmented interactions. “Intelligence” is applied after the content and interactions start, not before. This is basically what Google did for the web – instead of fully defined and meta-described resources in a database, organized according to subject areas (i.e. Yahoo at the time), intelligence was applied at the point of search. Aggregation should do the same – reveal the content and conversation structure of the course as it unfolds, rather than defining it in advance.
    • Barbara Lindsey
       
      This would really change how courses are currently taught. How would current course, program, departmental, school-wide assessments, evaluations react?
  • Educators often have years or decades of experience in a field. As such, they are familiar with many of the concepts, pitfalls, confusions, and distractions that learners are likely to encounter. As should be evident by now, the educator is an important agent in networked learning. Instead of being the sole or dominant filter of information, he now shares this task with other methods and individuals.
  • Filtering can be done in explicit ways – such as selecting readings around course topics – or in less obvious ways – such as writing summary blog posts around topics. Learning is an eliminative process. By determining what doesn’t belong, a learner develops and focuses his understanding of a topic. The teacher assists in the process by providing one stream of filtered information. The student is then faced with making nuanced selections based on the multiple information streams he encounters. The singular filter of the teacher has morphed into numerous information streams, each filtered according to different perspectives and world views.
  • During CCK08/09, one of Stephen’s statements that resonated with many learners centers on modelling as a teaching practice: “To teach is to model and to demonstrate. To learn is to practice and to reflect.”
  • Apprenticeship learning models are among the most effective in attending to the full breadth of learning. Apprenticeship is concerned with more than cognition and knowledge (to know about) – it also addresses the process of becoming a carpenter, plumber, or physician.
  • Without an online identity, you can’t connect with others – to know and be known. I don’t think I’m overstating the importance of have a presence in order to participate in networks. To teach well in networks – to weave a narrative of coherence with learners – requires a point of presence.
  • In CCK08/09, we used The Daily, the connectivism blog, elearnspace, OLDaily, Twitter, Facebook, Ning, Second Life, and numerous other tools to connect with learners. Persistent presence in the learning network is needed for the teacher to amplify, curate, aggregate, and filter content and to model critical thinking and cognitive attributes that reflect the needs of a discipline.
  • We’re
  • We’re still early in many of these trends. Many questions remain unanswered about privacy, ethics in networks, and assessment. My view is that change in education needs to be systemic and substantial. Education is concerned with content and conversations. The tools for controlling both content and conversation have shifted from the educator to the learner. We require a system that acknowledges this reality.
  • Aggregation had so much potential. And yet has delivered relatively little over the last decade.
  • Perhaps we need to spend more time in information abundant environments before we turn to aggregation as a means of making sense of the landscape.
  • I’d like a learning system that functions along the lines of RescueTime – actively monitoring what I’m doing – but then offers suggestions of what I should (or could) be doing additionally. Or a system that is aware of my email exchanges over the last several years and can provide relevant information based on the development of my thinking and work.
    • Barbara Lindsey
       
      Would you welcome this kind of feedback on your private exchanges?
Barbara Lindsey

2010 Horizon Report » One Year or Less: Mobile Computing - 0 views

  • In the developed world, mobile computing has become an indispensable part of day-to-day life in the workforce, and a key driver is the increasing ease and speed with which it is possible to access the Internet from virtually anywhere in the world via the ever-expanding cellular network.
  • The mobile market today has nearly 4 billion subscribers, more than two-thirds of whom live in developing countries.
  • These mobile computing tools have become accepted aids in daily life, giving us on-the-go access to tools for business, video/audio capture and basic editing, sensing and measurement, geolocation, social networking, personal productivity, references, just-in-time learning — indeed, virtually anything that can be done on a desktop.
  • ...4 more annotations...
  • For many people all over the world, but especially in developing countries, mobiles are increasingly the access point not only for common tools and communications, but also for information of all kinds, training materials, and more.
  • At Franklin & Marshall College, sixteen faculty in the year-long mLearning Pilot Project are using iPod Touches to explore ways mobile computing can be used in teaching, learning, and research in disciplines like history, psychology, religious studies, world languages, government, classics, and more.
  • students noted increased time spent accessing course materials as well as higher levels of collaboration with classmates.
  • San Francisco Museum of Modern Art Mobile Tours http://www.sfmoma.org/events/1556
1 - 20 of 27 Next ›
Showing 20 items per page