Skip to main content

Home/ beyondwebct/ Group items tagged calling

Rss Feed Group items tagged

Barbara Lindsey

gladwell dot com - designs for working - 0 views

  • The task of the office, then, is to invite a particular kind of social interaction--the casual, nonthreatening encounter that makes it easy for relative strangers to talk to each other. Offices need the sort of social milieu that Jane Jacobs found on the sidewalks of the West Village. "It is possible in a city street neighborhood to know all kinds of people without unwelcome entanglements, without boredom, necessity for excuses, explanations, fears of giving offense, embarrassments respecting impositions or commitments, and all such paraphernalia of obligations which can accompany less limited relationships," Jacobs wrote. If you substitute "office" for "city street neighborhood," that sentence becomes the perfect statement of what the modern employer wants from the workplace.
    • Barbara Lindsey
       
      This reminds me of the strength of weak ties argument.
  • In the war-room study, the company moved the client, the programmers, and a manager into a dedicated conference room, and made them stay there until the project was done. Using the war room cut the software-development time by two-thirds, in part because there was far less time wasted on formal meetings or calls outside the building: the people who ought to have been bumping into each other were now sitting next to each other.
  • The agency is in a huge old warehouse, three stories high and the size of three football fields. It is informally known as Advertising City, and that's what it is: a kind of artfully constructed urban neighborhood. The floor is bisected by a central corridor called Main Street, and in the center of the room is an open space, with café tables and a stand of ficus trees, called Central Park. There's a basketball court, a game room, and a bar. Most of the employees are in snug workstations known as nests, and the nests are grouped together in neighborhoods that radiate from Main Street like Paris arrondissements. The top executives are situated in the middle of the room. The desk belonging to the chairman and creative director of the company looks out on Central Park. The offices of the chief financial officer and the media director abut the basketball court. Sprinkled throughout the building are meeting rooms and project areas and plenty of nooks where employees can closet themselves when they need to.
  • ...7 more annotations...
  • A vital community, in Jacobs's view, required more than the appropriate physical environment. It also required a certain kind of person, who could bind together the varied elements of street life.
  • What Stephenson's X-rays do best, though, is tell you who the public characters are. In every network, there are always one or two people who have connections to many more people than anyone else. Stephenson calls them "hubs," and on her charts lines radiate out from them like spokes on a wheel. (Bernie the candy-store owner, on Jacobs's Hudson Street, was a hub.) A few people are also what Stephenson calls "gatekeepers": they control access to critical people, and link together a strategic few disparate groups. Finally, if you analyze the graphs there are always people who seem to have lots of indirect links to other people--who are part of all sorts of networks without necessarily being in the center of them. Stephenson calls those people "pulsetakers." (In Silicon Valleyspeak, the person in a sea of cubicles who pops his or her head up over the partition every time something interesting is going on is called a prairie dog: prairie dogs are pulsetakers.)
  • she pointed to the lines connecting that department with other departments. "They're all coming into this one place," she said, and she showed how all the lines coming out of marketing converged on one senior executive. "There's very little path redundancy. In human systems, you need redundancy, you need communication across multiple paths."
  • What concerned Stephenson wasn't just the lack of redundancy but the fact that, in her lingo, many of the paths were "unconfirmed": they went only one way.
  • What you want to do is put people who don't trust each other near each other. Not necessarily next to each other, because they get too close. But close enough so that when you pop your head up, you get to see people, they are in your path, and all of a sudden you build an inviting space where they can hang out, kitchens and things like that. Maybe they need to take a hub in an innovation network and place the person with a pulsetaker in an expert network--to get that knowledge indirectly communicated to a lot of people."
  • it's clear that there are some very simple principles from the study of public characters which ought to drive the design process. "You want to place hubs at the center," Joyce Bromberg, the director of space planning, says. "These are the ones other people go to in order to get information. Give them an environment that allows access. But there are also going to be times that they need to have control--so give them a place where they can get away. Gatekeepers represent the fit between groups. They transmit ideas. They are brokers, so you might want to put them at the perimeter, and give them front porches"--areas adjoining the workspace where you might put little tables and chairs. "Maybe they could have swinging doors with white boards, to better transmit information. As for pulsetakers, they are the roamers. Rather than give them one fixed work location, you might give them a series of touchdown spots--where you want them to stop and talk. You want to enable their meandering."
  • The point of the new offices is to compel us to behave and socialize in ways that we otherwise would not--to overcome our initial inclination to be office suburbanites. But, in all the studies of the new workplaces, the reservations that employees have about a more social environment tend to diminish once they try it. Human behavior, after all, is shaped by context, but how it is shaped--and whether we'll be happy with the result--we can understand only with experience.
Barbara Lindsey

Apple's iPhone OS 4.0: What Will It Mean for Mobile Learning? by Bill Brandon : Learni... - 0 views

  • This has pretty exciting possibilities for Webinar/virtual classroom applications. The demo this morning was Skype. Until now, if you weren’t running Skype in the foreground on your iPhone, you couldn’t receive calls, and if you left the Skype app during a call, the call would disconnect. Now even when the phone is locked, you will still be able to receive Skype calls. When the phone is asleep or when the user is running other apps, VoIP apps can receive calls. When you send Skype to the background, incoming call invites will appear as the standard iPhone/iPod notification. Clicking the answer button brings the Skype app back. One question in the backchat during the presentation was whether there might be a new iPhone coming with a front-facing camera for such calls, but this went unanswered.
  • The new OS, in the background, will use cell towers to detect the phone’s location, in order to minimize power demands. The primary use of this service will be for turn-by-turn navigation. The secondary use will be to support social networking apps, such as Loopt. The OS has privacy protection for this service. An indicator on the status bar lets the user know when an app is using his or her location. The user can enable and disable location use by individual apps. This service could be useful for “location-based learning.”
  • Users can read books on any device (iPhone/iPod Touch/iPad). The books sync between devices, so that a user can stop reading a book on one device, then open it on another, and at the same place. This could be extremely handy for textbook use.
  • ...1 more annotation...
  • Mobile device management Wireless application distribution (iTunes sync not required)
Barbara Lindsey

Curricula Designed to Meet 21st-Century Expectations | Resources | EDUCAUSE - 0 views

  • W here students had once called a large number of their classes "death by lecture," she noted they were now calling them "death by PowerPoint." >
  • here students had once called a large number of their classes "death by lecture," she noted they were now calling them "death by PowerPoint."
    • Barbara Lindsey
       
      Not representative sample
  • ...13 more annotations...
  • With such specific applications of technology and the limited use of other forms (for example, multimedia), students' low expectations for the use of technology in the curriculum is not surprising. Such constrained use of technology by the faculty in the curriculum and low student expectations may serve to limit innovation and creativity as well as the faculty's capacity to engage students more deeply in their subject matter. Like all organizations, colleges and universities respond to the demands placed upon them. Students' and institutions' low expectations for the use of technology for learning provide insufficient impetus for faculties to change their behavior and make broader, more innovative use of these tools in the service of learning.
  • Consider this scenario:
  • From the beginning, however, a problem arose in that those middle school students went on to high schools and later to colleges that did not (and do not) provide this type of rich learning experience—a learning experience that can best be achieved when technology is used in the service of learning.
  • Data obtained from these sessions with high school and college seniors in Indiana, Oregon, and Virginia
  • Less attention has been given to how to help students achieve the desired learning outcomes through technology.
  • comparatively little support has been devoted to helping faculty use computers and other technologies in creative and innovative ways to deepen student learning.
  • To develop intentional learners, the curriculum must go beyond helping students gain knowledge for knowledge's sake to engaging students in the construction of knowledge for the sake of addressing the challenges faced by a complex, global society.
  • institutional structures and practices to resolve technical problems that faculty invariably encounter are very limited or are not the type of aid needed. Such lack of support limits the amount of time faculty can spend on what they do best—building a compelling curriculum and integrating technology for more powerful learning.
  • integrating study abroad into courses back on the home campus;
  • Faculty concerns perhaps center less on being "replaceable" and more on worrying that the teaching and learning enterprise will be reduced to students gathering information that can be easily downloaded, causing them to rely too heavily on technology instead of intellect.
    • Barbara Lindsey
       
      Mentioned frequently by our group members.
  • First, traditional age students overwhelmingly prefer face-to-face contact with faculty to mediated communication. Second, technology used in the service of learning will require more—not less—sophistication on the part of students as they engage in processes of integration, translation, audience analysis, and critical judgment.
  • Faculty with expertise in one or more subjects, who have been exposed to what we know about how people learn, can determine how to enhance this learning through the use of technology. But simply understanding how to use technology will not provide the integration needed to reach the desired learning outcomes.
    • Barbara Lindsey
       
      Last sentence here most important.
  • There is a need for integrating technology that is in the service of learning throughout the curriculum. More intentional use of technology to capture what students know and are able to integrate in their learning is needed.
suzanne ondrus

Social Media in Africa, Part 1 - 1 views

  • undergoing a connectivity revolution
  • Africa
  • Part One of this series looks at social media contributions from Africans, Part Two looks at mobile and connectivity innovations and Part Three looks at how local Governments, NGOs and nonprofits are being affected.
  • ...8 more annotations...
  • Technology unconferences and Barcamps have sprung up all over the continent, everywhere from Kenya to Nairobi to Madagascar to Uganda and Senegal.
  • The three biggest success stories of independent social media projects taking off in Africa are Afrigator (a South African aggregator of African blogs and news), Zoopy (a YouTube/Flickr like service also out of South Africa) and Ushahidi (an SMS crisis reporting and mapping engine from Kenya). All three have drawn international attention which resulted in a major investment for Zoopy and Afrigator's acquisition (ReadWriteWeb's coverage). Meanwhile Ushahidi has successfully raised several rounds of funding after winning the Net2 Mashup Compeition prize of $25,000.
  • Afrigator defines itself as "a social media aggregator and directory built especially for African digital citizens who publish and consume content on the web."
  • Zoopy is a South African social media tool created by Jason Elk that allows users to upload videos, podcasts, and pictures and share them on the web.
  • Ushahidi relies heavily upon GoogleMaps, which it uses for mapping reports of incidents. It's built on the Zend framework for PHP and uses a number of different protocols for SMS, GPRS and mapping data.
    • Barbara Lindsey
       
      Example of mashup and use of geomapping.
  • The applications to follow are definitely the ones that leverage the mobile telephony infrastructure. An overwhelming portion of African users have no convenient access beyond cellular terminals - and that has spawned very innovative solutions based on existing and widely accessible technologies such as SMS. Examples abound such as Mpesa, Celpay, Etranzact and everyone else who is thriving in that formerly almost entirely cash-bound insecure environment. Underdeveloped banking and underdeveloped fixed telecommunications infrastructures are huge opportunities.
  • The Web Community
    • suzanne ondrus
       
      Internet is expensive in Africa, at least where I was in Benin. It was a dollar an hour where I was. And teachers only earned $3 a day.
  • Mobile phones
    • suzanne ondrus
       
      I was in Benin for nine months in 2006-2007 and can attest to how expensive it is to talk on cell phones- for local calls! A 15 min. local call cost about $20. I remember thinking how calling from the U.S. to Benin was cheaper than making local calls in Benin.
Barbara Lindsey

Cell Phones in the (Language) Classroom: Recasting the Debate (EDUCAUSE Quarterly) | ED... - 0 views

  • New Internet SMS and messaging services are proving especially useful to language teachers, turning the focus away from the particulars of language and writing and toward whole language oral output and pronunciation, even at the beginner level.
  • is the time to revisit and recast the debate over cell phones in education and to consider their relevance as engagement and assessment tools for foreign language teachers in particular.
  • And it is no longer only what takes place inside the classroom that needs debating. Paradigm shift also means embracing the notion that learning takes place in more collaborative, interactive ways and also — at least potentially — everywhere and (nearly) all the time.
  • ...11 more annotations...
  • The launch this year of Google Voice — representing as it does a free alternative or complement to costly language laboratory recording hardware and software — has profound and exciting implications for student engagement in general and the confluence of language instruction and cell phone technology in particular. The proliferation of cell phones among today’s students combined with the development of such new computer-mediated communication tools allows teachers to engage students in new ways in and out of the classroom.
  • My Google Voice number has served primarily as a messaging service students call (sometimes spontaneously during the instructional period, more often outside of the classroom) to record dialogues, poetry, even song, either individually or in pairs. These recordings are stored on Google servers, but can be downloaded and posted on course management pages (Moodle, Blackboard, Sakai, etc.) or podcasting, blogging, or social networking sites (I post particularly good recordings on my Spanish Facebook page).
  • maximizing student engagement during the class period is essential, as many students work and do not practice outside the classroom setting. Without getting into the debate over the front-end need for considerable comprehensible input, as a practical matter many students see paired work time (particularly in larger classes) as social time, which can lead to student-teacher conflict (no explanation needed).
  • for lower level classes I can instruct my students to form small groups and, within a given time frame, call my Google Voice number and record a narration of an illustration or picture sequence. In the higher level classes, I can ask groups to come up with a succinct recorded comparison/contrast analysis of two different perspectives (textual and/or auditory) on a given subject. Either way, embracing whole language oral output turns the focus from the particulars of language and writing to whole language and pronunciation. It also allows for efficient instructor identification of common problem points.
  • It is generally accepted that students work harder and become more engaged and invested in activities and assignments that might be publicly posted (on the Internet or otherwise). My own experience shows that students required to record speech of any kind in a computer laboratory setting spend considerable time preparing prior to recording. The very act of recording their voices — creating a permanent record of their speech — instilled a strong desire to perform well. In short, the act of recording increased students’ investment and engagement in the learning process.
  • on a post-recording survey of a Spanish 3 class of 21 students, I asked students to respond anonymously to the following survey question:“I practice my Spanish pronunciation before calling Google Voice… not at all once more than once repeatedly”A total of 89 percent of the 21 respondents answered either “b,” “c,” or “d,” with 26 percent responding “repeatedly.” Among the more entertaining and pertinent written comments offered on the anonymous survey were the following: “AHH!! I feel smart because I actually practice a lot before I call.” “It makes me nervous having to record, but I practice a lot to help me get over that.” “I do not do the Google Voice because I don’t want the whole class to hear me.”The final comment clearly referred to my tendency to play recordings for full class feedback — food for thought. Is that a motivating or inhibiting factor? It probably depends on the student.
  • A student who was frustrated at his performance in Spanish and was beginning to exhibit some anger management issues received the following Spanish translation of a Ralph Waldo Emerson quote via text message through Google Voice: Por cada minuto que estás enojado, pierdes sesenta segundos de felicidad. I did not supply a translation
  • The access that I had to that student combined with the ease and speed of communication presented by Google Voice solved more than a pronunciation problem; it likely helped me head off a building class management issue by engaging that student on his terms outside of the classroom setting.
  • “I have a student who hasn’t done any homework this quarter, and out of the blue he sent me a goofy text message to my Google Voice number — completely unrelated to Spanish — something like “I hate this rain”— and, being the nerdy teacher, I texted him immediately back in Spanish: “No me gusta la lluvia tampoco.” One day later, he walks in for the first time with his homework and makes a big production about turning it in. I can’t help but feel that the personal connection of texting helped him remember — and actually want to do — the work for my class.”
  • Surprisingly, these “irredeemably unreachable” students have proven highly receptive to the notion that their cell phones can and should be used for educational purposes. Figure 2, for example, shows a fairly typical SMS exchange on an oral homework assignment for intermediate level students. While not all students will text back when I supply SMS feedback, those that do, like this one, tend to be looking for specifics and positive reinforcement. How is this additional engagement and interaction bad?
  • Elite schools have spent vast sums of money on expensive language laboratory hardware and software as an approach to active engagement in the language learning process. They have provided their students with the latest and greatest in computer-assisted (language) learning and computer-mediated communication tools, at considerable cost.
    • Barbara Lindsey
       
      Why would you place students in an artificial environment with artificial activities instead of using technologies that are flexible and allow for authentic exchanges?
Barbara Lindsey

What we learned from 5 million books | Video on TED.com - 0 views

    • Barbara Lindsey
       
      From YouTube version of this talk: "[Google's digtized books] are very practical and extremely awesome." Erez Lieberman Aiden and Jean-Baptiste Michel from Harvard University use the 15 million books scanned and digitized by Google to show how a visual and quantitative analysis of text can provide insights about fields as diverse as lexicography, the evolution of grammar, collective memory, the adoption of technology, the pursuit of fame, censorship, and historical epidemiology.
  • ELA: There are more sobering notes among the n-grams. For instance, here's the trajectory of Marc Chagall, an artist born in 1887. And this looks like the normal trajectory of a famous person. He gets more and more and more famous, except if you look in German. If you look in German, you see something completely bizarre, something you pretty much never see, which is he becomes extremely famous and then all of a sudden plummets, going through a nadir between 1933 and 1945, before rebounding afterward. And of course, what we're seeing is the fact Marc Chagall was a Jewish artist in Nazi Germany. Now these signals are actually so strong that we don't need to know that someone was censored. We can actually figure it out using really basic signal processing. Here's a simple way to do it. Well, a reasonable expectation is that somebody's fame in a given period of time should be roughly the average of their fame before and their fame after. So that's sort of what we expect. And we compare that to the fame that we observe. And we just divide one by the other to produce something we call a suppression index. If the suppression index is very, very, very small, then you very well might be being suppressed. If it's very large, maybe you're benefiting from propaganda.
  • Now when Google digitizes a book, they put it into a really nice format. Now we've got the data, plus we have metadata. We have information about things like where was it published, who was the author, when was it published. And what we do is go through all of those records and exclude everything that's not the highest quality data. What we're left with is a collection of five million books, 500 billion words, a string of characters a thousand times longer than the human genome -- a text which, when written out, would stretch from here to the Moon and back 10 times over -- a veritable shard of our cultural genome.
  • ...4 more annotations...
  • we're going to release statistics about the books. So take for instance "A gleam of happiness." It's four words; we call that a four-gram. We're going to tell you how many times a particular four-gram appeared in books in 1801, 1802, 1803, all the way up to 2008. That gives us a time series of how frequently this particular sentence was used over time. We do that for all the words and phrases that appear in those books, and that gives us a big table of two billion lines that tell us about the way culture has been changing.
  • You might also want to have a look at this particular n-gram, and that's to tell Nietzsche that God is not dead, although you might agree that he might need a better publicist.
  • JM: Now you can actually look at the distribution of suppression indexes over whole populations. So for instance, here -- this suppression index is for 5,000 people picked in English books where there's no known suppression -- it would be like this, basically tightly centered on one. What you expect is basically what you observe. This is distribution as seen in Germany -- very different, it's shifted to the left. People talked about it twice less as it should have been. But much more importantly, the distribution is much wider. There are many people who end up on the far left on this distribution who are talked about 10 times fewer than they should have been. But then also many people on the far right who seem to benefit from propaganda. This picture is the hallmark of censorship in the book record.
  • ELA: So culturomics is what we call this method. It's kind of like genomics. Except genomics is a lens on biology through the window of the sequence of bases in the human genome. Culturomics is similar. It's the application of massive-scale data collection analysis to the study of human culture. Here, instead of through the lens of a genome, through the lens of digitized pieces of the historical record. The great thing about culturomics is that everyone can do it. Why can everyone do it? Everyone can do it because three guys, Jon Orwant, Matt Gray and Will Brockman over at Google, saw the prototype of the Ngram Viewer, and they said, "This is so fun. We have to make this available for people." So in two weeks flat -- the two weeks before our paper came out -- they coded up a version of the Ngram Viewer for the general public. And so you too can type in any word or phrase that you're interested in and see its n-gram immediately -- also browse examples of all the various books in which your n-gram appears.
  •  
    fall 2012 syllabus
Barbara Lindsey

Minds on Fire: Open Education, the Long Tail, and Learning 2.0 (EDUCAUSE Review) | EDUC... - 0 views

  • But at the same time that the world has become flatter, it has also become “spikier”: the places that are globally competitive are those that have robust local ecosystems of resources supporting innovation and productiveness.2
  • various initiatives launched over the past few years have created a series of building blocks that could provide the means for transforming the ways in which we provide education and support learning. Much of this activity has been enabled and inspired by the growth and evolution of the Internet, which has created a global “platform” that has vastly expanded access to all sorts of resources, including formal and informal educational materials. The Internet has also fostered a new culture of sharing, one in which content is freely contributed and distributed with few restrictions or costs.
  • the most visible impact of the Internet on education to date has been the Open Educational Resources (OER) movement, which has provided free access to a wide range of courses and other educational materials to anyone who wants to use them. The movement began in 2001 when the William and Flora Hewlett and the Andrew W. Mellon foundations jointly funded MIT’s OpenCourseWare (OCW) initiative, which today provides open access to undergraduate- and graduate-level materials and modules from more than 1,700 courses (covering virtually all of MIT’s curriculum). MIT’s initiative has inspired hundreds of other colleges and universities in the United States and abroad to join the movement and contribute their own open educational resources.4 The Internet has also been used to provide students with direct access to high-quality (and therefore scarce and expensive) tools like telescopes, scanning electron microscopes, and supercomputer simulation models, allowing students to engage personally in research.
  • ...29 more annotations...
  • most profound impact of the Internet, an impact that has yet to be fully realized, is its ability to support and expand the various aspects of social learning. What do we mean by “social learning”? Perhaps the simplest way to explain this concept is to note that social learning is based on the premise that our understanding of content is socially constructed through conversations about that content and through grounded interactions, especially with others, around problems or actions. The focus is not so much on what we are learning but on how we are learning.5
  • This perspective shifts the focus of our attention from the content of a subject to the learning activities and human interactions around which that content is situated. This perspective also helps to explain the effectiveness of study groups. Students in these groups can ask questions to clarify areas of uncertainty or confusion, can improve their grasp of the material by hearing the answers to questions from fellow students, and perhaps most powerfully, can take on the role of teacher to help other group members benefit from their understanding (one of the best ways to learn something is, after all, to teach it to others).
  • This encourages the practice of what John Dewey called “productive inquiry”—that is, the process of seeking the knowledge when it is needed in order to carry out a particular situated task.
  • ecoming a trusted contributor to Wikipedia involves a process of legitimate peripheral participation that is similar to the process in open source software communities. Any reader can modify the text of an entry or contribute new entries. But only more experienced and more trusted individuals are invited to become “administrators” who have access to higher-level editing tools.8
  • by clicking on tabs that appear on every page, a user can easily review the history of any article as well as contributors’ ongoing discussion of and sometimes fierce debates around its content, which offer useful insights into the practices and standards of the community that is responsible for creating that entry in Wikipedia. (In some cases, Wikipedia articles start with initial contributions by passionate amateurs, followed by contributions from professional scholars/researchers who weigh in on the “final” versions. Here is where the contested part of the material becomes most usefully evident.) In this open environment, both the content and the process by which it is created are equally visible, thereby enabling a new kind of critical reading—almost a new form of literacy—that invites the reader to join in the consideration of what information is reliable and/or important.
  • But viewing learning as the process of joining a community of practice reverses this pattern and allows new students to engage in “learning to be” even as they are mastering the content of a field.
  • Mastering a field of knowledge involves not only “learning about” the subject matter but also “learning to be” a full participant in the field. This involves acquiring the practices and the norms of established practitioners in that field or acculturating into a community of practice.
  • Another interesting experiment in Second Life was the Harvard Law School and Harvard Extension School fall 2006 course called “CyberOne: Law in the Court of Public Opinion.” The course was offered at three levels of participation. First, students enrolled in Harvard Law School were able to attend the class in person. Second, non–law school students could enroll in the class through the Harvard Extension School and could attend lectures, participate in discussions, and interact with faculty members during their office hours within Second Life. And at the third level, any participant in Second Life could review the lectures and other course materials online at no cost. This experiment suggests one way that the social life of Internet-based virtual education can coexist with and extend traditional education.
  • Digital StudyHall (DSH), which is designed to improve education for students in schools in rural areas and urban slums in India. The project is described by its developers as “the educational equivalent of Netflix + YouTube + Kazaa.”11 Lectures from model teachers are recorded on video and are then physically distributed via DVD to schools that typically lack well-trained instructors (as well as Internet connections). While the lectures are being played on a monitor (which is often powered by a battery, since many participating schools also lack reliable electricity), a “mediator,” who could be a local teacher or simply a bright student, periodically pauses the video and encourages engagement among the students by asking questions or initiating discussions about the material they are watching.
  • John King, the associate provost of the University of Michigan
  • For the past few years, he points out, incoming students have been bringing along their online social networks, allowing them to stay in touch with their old friends and former classmates through tools like SMS, IM, Facebook, and MySpace. Through these continuing connections, the University of Michigan students can extend the discussions, debates, bull sessions, and study groups that naturally arise on campus to include their broader networks. Even though these extended connections were not developed to serve educational purposes, they amplify the impact that the university is having while also benefiting students on campus.14 If King is right, it makes sense for colleges and universities to consider how they can leverage these new connections through the variety of social software platforms that are being established for other reasons.
  • The project’s website includes reports of how students, under the guidance of professional astronomers, are using the Faulkes telescopes to make small but meaningful contributions to astronomy.
  • “This is not education in which people come in and lecture in a classroom. We’re helping students work with real data.”16
  • HOU invites students to request observations from professional observatories and provides them with image-processing software to visualize and analyze their data, encouraging interaction between the students and scientists
  • The site is intended to serve as “an open forum for worldwide discussions on the Decameron and related topics.” Both scholars and students are invited to submit their own contributions as well as to access the existing resources on the site. The site serves as an apprenticeship platform for students by allowing them to observe how scholars in the field argue with each other and also to publish their own contributions, which can be relatively small—an example of the “legitimate peripheral participation” that is characteristic of open source communities. This allows students to “learn to be,” in this instance by participating in the kind of rigorous argumentation that is generated around a particular form of deep scholarship. A community like this, in which students can acculturate into a particular scholarly practice, can be seen as a virtual “spike”: a highly specialized site that can serve as a global resource for its field.
  • I posted a list of links to all the student blogs and mentioned the list on my own blog. I also encouraged the students to start reading one another's writing. The difference in the writing that next week was startling. Each student wrote significantly more than they had previously. Each piece was more thoughtful. Students commented on each other's writing and interlinked their pieces to show related or contradicting thoughts. Then one of the student assignments was commented on and linked to from a very prominent blogger. Many people read the student blogs and subscribed to some of them. When these outside comments showed up, indicating that the students really were plugging into the international community's discourse, the quality of the writing improved again. The power of peer review had been brought to bear on the assignments.17
  • for any topic that a student is passionate about, there is likely to be an online niche community of practice of others who share that passion.
  • Finding and joining a community that ignites a student’s passion can set the stage for the student to acquire both deep knowledge about a subject (“learning about”) and the ability to participate in the practice of a field through productive inquiry and peer-based learning (“learning to be”). These communities are harbingers of the emergence of a new form of technology-enhanced learning—Learning 2.0—which goes beyond providing free access to traditional course materials and educational tools and creates a participatory architecture for supporting communities of learners.
  • We need to construct shared, distributed, reflective practicums in which experiences are collected, vetted, clustered, commented on, and tried out in new contexts.
  • An example of such a practicum is the online Teaching and Learning Commons (http://commons.carnegiefoundation.org/) launched earlier this year by the Carnegie Foundation for the Advancement of Teaching
  • The Commons is an open forum where instructors at all levels (and from around the world) can post their own examples and can participate in an ongoing conversation about effective teaching practices, as a means of supporting a process of “creating/using/re-mixing (or creating/sharing/using).”20
  • The original World Wide Web—the “Web 1.0” that emerged in the mid-1990s—vastly expanded access to information. The Open Educational Resources movement is an example of the impact that the Web 1.0 has had on education.
  • But the Web 2.0, which has emerged in just the past few years, is sparking an even more far-reaching revolution. Tools such as blogs, wikis, social networks, tagging systems, mashups, and content-sharing sites are examples of a new user-centric information infrastructure that emphasizes participation (e.g., creating, re-mixing) over presentation, that encourages focused conversation and short briefs (often written in a less technical, public vernacular) rather than traditional publication, and that facilitates innovative explorations, experimentations, and purposeful tinkerings that often form the basis of a situated understanding emerging from action, not passivity.
  • In the twentieth century, the dominant approach to education focused on helping students to build stocks of knowledge and cognitive skills that could be deployed later in appropriate situations. This approach to education worked well in a relatively stable, slowly changing world in which careers typically lasted a lifetime. But the twenty-first century is quite different.
  • We now need a new approach to learning—one characterized by a demand-pull rather than the traditional supply-push mode of building up an inventory of knowledge in students’ heads. Demand-pull learning shifts the focus to enabling participation in flows of action, where the focus is both on “learning to be” through enculturation into a practice as well as on collateral learning.
  • The demand-pull approach is based on providing students with access to rich (sometimes virtual) learning communities built around a practice. It is passion-based learning, motivated by the student either wanting to become a member of a particular community of practice or just wanting to learn about, make, or perform something. Often the learning that transpires is informal rather than formally conducted in a structured setting. Learning occurs in part through a form of reflective practicum, but in this case the reflection comes from being embedded in a community of practice that may be supported by both a physical and a virtual presence and by collaboration between newcomers and professional practitioners/scholars.
  • The building blocks provided by the OER movement, along with e-Science and e-Humanities and the resources of the Web 2.0, are creating the conditions for the emergence of new kinds of open participatory learning ecosystems23 that will support active, passion-based learning: Learning 2.0.
  • As a graduate student at UC-Berkeley in the late 1970s, Treisman worked on the poor performance of African-Americans and Latinos in undergraduate calculus classes. He discovered the problem was not these students’ lack of motivation or inadequate preparation but rather their approach to studying. In contrast to Asian students, who, Treisman found, naturally formed “academic communities” in which they studied and learned together, African-Americans tended to separate their academic and social lives and studied completely on their own. Treisman developed a program that engaged these students in workshop-style study groups in which they collaborated on solving particularly challenging calculus problems. The program was so successful that it was adopted by many other colleges. See Uri Treisman, “Studying Students Studying Calculus: A Look at the Lives of Minority Mathematics Students in College,” College Mathematics Journal, vol. 23, no. 5 (November 1992), pp. 362–72, http://math.sfsu.edu/hsu/workshops/treisman.html.
  • In the early 1970s, Stanford University Professor James Gibbons developed a similar technique, which he called Tutored Videotape Instruction (TVI). Like DSH, TVI was based on showing recorded classroom lectures to groups of students, accompanied by a “tutor” whose job was to stop the tape periodically and ask questions. Evaluations of TVI showed that students’ learning from TVI was as good as or better than in-classroom learning and that the weakest students academically learned more from participating in TVI instruction than from attending lectures in person. See J. F. Gibbons, W. R. Kincheloe, and S. K. Down, “Tutored Video-tape Instruction: A New Use of Electronics Media in Education,” Science, vol. 195 (1977), pp. 1136–49.
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

The Problems With Calling Comments "Post-Publication Peer-Review" « The Schol... - 0 views

  •  
    Fall 2012 syllabus
Barbara Lindsey

How to Outsmart Tracking Cookies on the Web - WSJ.com - 0 views

  • To have the most privacy options, upgrade to the latest version of the browser you use.
  • All popular browsers let users view and delete cookies installed on their computer.
  • Once you've deleted cookies, you can limit the installation of new ones.
  • ...6 more annotations...
  • Internet Explorer lets you set rules for blocking cookies based on the policies of the cookie-placer.
  • No major browsers let you track or block beacons without installing extra software known as "plug-ins," as described under advanced steps.
  • All major browsers offer a "private browsing" mode to limit cookies. Chrome calls it "Incognito." Internet Explorer calls it "InPrivate Browsing," but this option is available only in the latest version, IE8.
  • It deletes cookies each time you close the browser or turn off private browsing, effectively hiding your history.
  • "Flash Cookies"
  • Flash is the most common way to show video online. As with regular cookies, Flash cookies can be useful for remembering preferences, such as volume settings for videos. But marketers also can use Flash cookies to track what you do online.
    • Barbara Lindsey
       
      So every time you see a flash video (YouTube is an example) you are being tracked.
Barbara Lindsey

Cell Phones in the (Language) Classroom: Recasting the Debate (EDUCAUSE Quarterly) | ED... - 0 views

  • My Google Voice number has served primarily as a messaging service students call (sometimes spontaneously during the instructional period, more often outside of the classroom) to record dialogues, poetry, even song, either individually or in pairs. These recordings are stored on Google servers, but can be downloaded and posted on course management pages (Moodle, Blackboard, Sakai, etc.) or podcasting, blogging, or social networking sites (I post particularly good recordings on my Spanish Facebook page). While I have yet to experiment with this particular feature, Google Voice can also be used for conference calling, and dialogues with groups of students can be recorded for later informal group or formal teacher evaluation.
    • Barbara Lindsey
       
      Do you see any issues with posting recordings on Facebook?
  • It is generally accepted that students work harder and become more engaged and invested in activities and assignments that might be publicly posted (on the Internet or otherwise). My own experience shows that students required to record speech of any kind in a computer laboratory setting spend considerable time preparing prior to recording. The very act of recording their voices — creating a permanent record of their speech — instilled a strong desire to perform well. In short, the act of recording increased students’ investment and engagement in the learning process.
    • Barbara Lindsey
       
      Do you find this to be true for your students as well? How about for you?
  • The access that I had to that student combined with the ease and speed of communication presented by Google Voice solved more than a pronunciation problem; it likely helped me head off a building class management issue by engaging that student on his terms outside of the classroom setting.
    • Barbara Lindsey
       
      Your thoughts?
  • ...2 more annotations...
  • “I have a student who hasn’t done any homework this quarter, and out of the blue he sent me a goofy text message to my Google Voice number — completely unrelated to Spanish — something like “I hate this rain”— and, being the nerdy teacher, I texted him immediately back in Spanish: “No me gusta la lluvia tampoco.” One day later, he walks in for the first time with his homework and makes a big production about turning it in. I can’t help but feel that the personal connection of texting helped him remember — and actually want to do — the work for my class.”
  • While not all students will text back when I supply SMS feedback, those that do, like this one, tend to be looking for specifics and positive reinforcement. How is this additional engagement and interaction bad?
Barbara Lindsey

Ok You Luddites, Time To Chill Out On Facebook Over Privacy - 0 views

  • The fact is that privacy is already really, really dead. Howard Lindzon nailed it the other day when he said “Equifax, Transunion, Capital One, American Express and their cousins raped our privacy,” Everything we do, everything we buy, everywhere we go is tracked and sitting in a database somewhere. Our location via our phone, or our car GPS. Our credit card transactions. Everything.
  • Supposedly many people were apprehensive about using telephones in the early 1900s because they knew the phone companies could listen in on their phone calls. There are people who won’t use phones today because of the ease in which calls can be tapped.
Barbara Lindsey

Mobile Learning Environments (EDUCAUSE Quarterly) | EDUCAUSE - 0 views

  • There are now more than 4.6 billion mobile phones in the world, according to the International Telecommunication Union (ITU)'s February 2010 press release. This means that mobile has taken the place of FM radio as the most ubiquitous communications technology on the planet.1
  • Mobile Phone Network model Centralized Peer-to-peer Content customization Uniform Personalized to context Information distribution Just-in-case Just-in-time Role of audience Consumer Equal p
  • articipant Reliability qualifier Authority Social capital Governance Institutional Relational
  • ...10 more annotations...
  • I've seen that the introduction of new technology can provide a reason to rethink a course from the ground up and reassess its core educational goals. Often the greatest educational benefits seem to come from this process, not just the technology that encouraged it.
  • It might be safe to say that each time a new medium appears, no matter how different it is from the last, the normal reaction of first adopters is to use it as a new package for existing content.
  • I've seen that the introduction of new technology can provide a reason to rethink a course from the ground up and reassess its core educational goals.
  • It can be easy to forget that we human beings are more than brains connected to an apparatus that moves us around in space. Instead, we belong to communities, we live in neighborhoods, we have local culture and events. Inquiry into these real things led to many of the fields we now call science, literature, mathematics, and history. Why then do we isolate instruction in those fields to a classroom, instead of deriving instruction from the environment from which these subjects originated?
  • place-based learning.2 One such example, Dow Day, is a mobile documentary that relives the student protests of 1967 in Madison, Wisconsin, against the Dow Chemical Company. In this activity, location-aware handheld devices add an augmented layer of history to a walk through the campus, placing the student in the role of a news reporter. By monitoring the device's GPS, Dow Day creates the illusion of additional characters standing in physical space and facilitates simulated conversations with these historical entities. In addition, when players walk to predefined media locations, they trigger video footage showing the physical scene from 40 years ago, effectively superimposing the marchers and police onto the current landscape (see Figure 2).
  • Situated theories of cognition claim that knowing and doing are inherently linked.4
  • One such example is a mobile game called Mentira, produced at the University of New Mexico. The game is designed to teach an introductory college Spanish course in ways that are contextually sound for language learning. In the first unit, students play a mystery game on handheld devices in class, taking on a role and a goal within a story told completely in Spanish. In the second part, the class moves outside to a local Spanish-speaking neighborhood where they continue the story while interacting with physical and virtual Spanish speakers in real places (see Figure 3).
  • With Mentira, students learn Spanish outside the classroom through narrative and interaction with members of a Spanish-speaking neighborhood, re-situating language in practice.
  • Identifying the disconnect, a small team from the Animal Science and the Academic Technology departments at UW–Madison are working on a prototype for hobbyist birdwatchers. WeBIRD aims to crowdsource ornithology research by providing a tool for hobbyist practitioners. A birder will record the audio of a bird heard out in the field and have the system identify the species while logging the sighting's location, current weather, time of day, and date to a central database. This data can then be used for anything from formal research of migration patterns over time to individual questions such as, "Where am I most likely to see a cardinal this time of year?" The potential for location-aware, casual gaming structures such as birder achievement badges and leader boards are also being investigated in order to provide additional social play motives for participation.
  • Learning happens anywhere someone has questions and the means to explore answers. As ubiquitous access to information continues to shift toward personal mobile devices, more and more of the learning that takes place may be happening outside of the classroom and in the context of a backyard conversation, a walk through campus, or a Taquería in New Mexico.
Barbara Lindsey

Who says our way is the right way? « BuzzMachine - 0 views

  •  
    A group of Danish academics say we are passing through the other side of what they wonderfully call the Gutenberg Parenthesis, leaving the structured, serial, permanent, authored, controlled era of text and returning, perhaps, to what came before the press: a time when communication and content cross, when process dominates product, when knowledge is distributed by people passing it around, when we remix it along the way, when we are more oral and aural.
Barbara Lindsey

I'm So Totally, Digitally Close to You - Clive Thompson - NYTimes.com - 0 views

  • “Facebook has always tried to push the envelope,” he said. “And at times that means stretching people and getting them to be comfortable with things they aren’t yet comfortable with. A lot of this is just social norms catching up with what technology is capable of.”
    • Barbara Lindsey
       
      Is this perhaps the same concern educators have and thus why they hesitate to adopt these social networks for teaching and research? Are they concerned about opening up their research and teaching and if so, is that, at times, justified?
    • Chenwen Hong
       
      I would answer with a yes. The emergence of technology, or "new" technology, has always presented threats to what people are accustomed to. Educators are no exceptions. They hesitate to adopt social networks because they know they can never think like before or follow the traditions they feel "safe" with, once they decide to give it a try. They would have to re-define their philosophy and revise teaching approaches. It means "great change" to open up teaching possibilities, and it follows that they are insecure because these networks push them out of their comfort zone. Yet, I would disagree that fear justifies the reluctance to try out new possibilities to teach. Insecurity originates from lack of knowledge. I believe more practical knowledge and training sessions would help a lot to relieve the discomfort. They would know how the networks function and how to benefit from them.
  • when they experienced this sort of omnipresent knowledge, they found it intriguing and addictive. Why?
  • Social scientists have a name for this sort of incessant online contact. They call it “ambient awareness.” It is, they say, very much like being physically near someone and picking up on his mood through the little things he does — body language, sighs, stray comments — out of the corner of your eye. Facebook is no longer alone in offering this sort of interaction online.
  • ...4 more annotations...
  • This is the paradox of ambient awareness. Each little update — each individual bit of social information — is insignificant on its own, even supremely mundane. But taken together, over time, the little snippets coalesce into a surprisingly sophisticated portrait of your friends’ and family members’ lives, like thousands of dots making a pointillist painting. This was never before possible, because in the real world, no friend would bother to call you up and detail the sandwiches she was eating. The ambient information becomes like “a type of E.S.P.,” as Haley described it to me, an invisible dimension floating over everyday life.
  • Twitters
  • ad hoc, self-organizing socializing.
  • when they do socialize face to face, it feels oddly as if they’ve never actually been apart. They don’t need to ask, “So, what have you been up to?” because they already know. Instead, they’ll begin discussing something that one of the friends Twittered that afternoon, as if picking up a conversation in the middle.
Barbara Lindsey

News: A Call for Copyright Rebellion - Inside Higher Ed - 0 views

  • “If copyright law, at its core, regulates something called ‘copies,’ then in the analog world… many uses of culture were copyright-free,” he explained. “They didn’t trigger copyright law, because no copy was made. But in the digital world, very few uses are copyright-free because in the digital world … all uses produce a copy.”
  • Absolute open access does weaken the incentive to create insofar as scholars crave some tangible remuneration for their commercially published works. The solution to the problem, he said, probably lies in hybrid systems such as Creative Commons, of which he is a board member. Creative Commons licenses allow authors to designate what portions of their work can be copied and how it may be used, thereby avoiding the “thicket” of the copyright system — where, Lessig said, things are never nearly that simple.
  •  
    Lawrence Lessig talks about copyright's impact on education in the digital age.
1 - 20 of 70 Next › Last »
Showing 20 items per page