Skip to main content

Home/ beyondwebct/ Group items tagged technology

Rss Feed Group items tagged

Barbara Lindsey

2010 Horizon Report » Technologies to Watch - 0 views

  • The near-term horizon assumes the likelihood of entry into the mainstream for institutions within the next twelve months; the mid-term horizon, within two to three years; and the far-term, within four to five years. It should be noted that the Horizon Report is not a predictive tool. It is meant, rather, to highlight emerging technologies with considerable potential for our focus areas of teaching, learning, and creative inquiry.
  • virtually all higher education students carry some form of mobile device, and the cellular network that supports their connectivity continues to grow. An increasing number of faculty and instructional technology staff are experimenting with the possibilities for collaboration and communication offered by mobile computing. Devices from smart phones to netbooks are portable tools for productivity, learning, and communication, offering an increasing range of activities fully supported by applications designed especially for mobiles.
  • Far more than a collection of free online course materials, the open content movement is a response to the rising costs of education, the desire for access to learning in areas where such access is difficult, and an expression of student choice about when and how to learn.
  • ...4 more annotations...
  • Already in the mainstream of consumer use, electronic books are appearing on campuses with increasing frequency.
  • applications for laptops and smart phones overlay digital information onto the physical world quickly and easily.
  • Devices that are controlled by natural movements of the finger, hand, arm, and body are becoming more common. Game companies in particular are exploring the potential offered by consoles that require no handheld controller, but instead recognize and interpret body motions.
  • Visual data analysis is an emerging field, a blend of statistics, data mining, and visualization, that promises to make it possible for anyone to sift through, display, and understand complex concepts and relationships.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

Students Can't Handle Technology, Says Report | Technology | Epoch Times - 0 views

  •  
    Seems pretty evident and already done before, e.g., ACOT...
Barbara Lindsey

The University of Wherever - NYTimes.com - 0 views

  • Thrun, a German-born and largely self-taught expert in robotics, is famous for leading the team that built Google’s self-driving car. He is offering his “Introduction to Artificial Intelligence” course online and free of charge. His remote students will get the same lectures as students paying $50,000 a year, the same assignments, the same exams and, if they pass, a “statement of accomplishment” (though not Stanford credit). When The Times wrote about this last month, 58,000 students had signed up for the course. After the article, enrollment leapt to 130,000, from across the globe.
  • Thrun’s ultimate mission is a virtual university in which the best professors broadcast their lectures to tens of thousands of students. Testing, peer interaction and grading would happen online; a cadre of teaching assistants would provide some human supervision; and the price would be within reach of almost anyone. “Literally, we can probably get the same quality of education I teach in class for about 1 to 2 percent of the cost,” Thrun told me.
    • Barbara Lindsey
       
      Your thoughts?
  • Thrun believes there are technological answers to all of these questions, some of them being worked out already by other online frontiersmen.
  • ...4 more annotations...
  • “If we can solve this,” he said, “I think it will disrupt all of higher education.”
  • John Hennessy, Stanford’s president, gave the university’s blessing to Thrun’s experiment, which he calls “an initial demonstration,” but he is cautious about the grander dream of a digitized university. He can imagine a virtual campus for some specialized programs and continuing education, and thinks the power of distributed learning can be incorporated in undergraduate education — for example, supplanting the large lecture that is often filled with students paying more attention to their laptops. He endorses online teaching as a way to educate students, in the developing world or our own, who cannot hope for the full campus experience.
  • As The Times’s Matt Richtel recently reported, there is remarkably little data showing that technology-centric schooling improves basic learning. It is quite possible that the infatuation with technology has diverted money from things known to work — training better teachers, giving kids more time in school.
  • “When is the infrastructure of the university particularly valuable — as it is, I believe, for an undergraduate residential experience — and when is it secondary to the learning process?”
  •  
    Op ed piece on Stanford's free AI course and the impact of open, online education on the traditional academy. Should have mentioned Siemens, Downes & Couros MOOCs.
Barbara Lindsey

How Teenagers Are Using Technology in Their Social Lives (REPORT PDF)| The Committed Sa... - 0 views

  • I'm tempted to be skeptical because the information is from Ericsson ConsumerLab, a division of the mobile technology giant Ericsson - a company that has a vested interest in promoting the use of technology by teenagers. But some results may not be all that surprising, such as a decrease in the use of home phones and an increase in the use of mobile devices such as smart phones. Or that teens and adults use technology differently. Well, duh... spend any time with a teenager on a regular basis and that's obvious. It's also not news that video chatting is on the rise, but it may at the very least confirm perceptions and some opinions.
Barbara Lindsey

Stop Chasing High-Tech Cheaters | Inside Higher Ed - 0 views

  • It has long been academe's dirty little secret that bad instructors and bad assignments create cheating.
  • "In today's information age, where a body of information in all but the narrowest of fields is beyond anyone's ability to master, why aren't colleges teaching students how to research, organize and evaluate the information that is out there?"
  • If, however, processing information is the issue, if creative solutions are being sought, if students are being asked to develop new syntheses, then cheating will be much rarer, and much more difficult, technology use will become essential, and learning will be far more relevant.
  • ...2 more annotations...
  • So schools do not teach effective use of Google, of text-messaging, of instant-messaging. They don't teach collaboration. They barely teach communication outside the stilted prose only academics use. No wonder students are prepared for nothing except more school.
  • There is also the issue of educational discrimination. When schools fight against technology, they are fighting access to education for people who learn and function differently. Technology, from computers to calculators to classroom cellphones, enables a wide variety of students who would otherwise be left out to participate and succeed. Technology in the hands of all students allows disabilities and functional deficits to be invisibly accommodated so that knowledge can be developed, nurtured, and evaluated on terms fair to everyone.So, no, the problem is not cheating. The problem is firmly one of instructional and evaluation technique. It will not be solved until teachers and professors figure out that understanding and the ability to work with knowledge is what counts, and that anything you can instantly Google, or store in your calculator, or retrieve via quick text-message or phone call need not be remembered, nor tested, because, obviously, you will always be able to instantly Google it, or store it in your cellphone, or get someone to text it to you. 
Barbara Lindsey

Fostering Cross-Cultural Understanding Through E-Learning: Russian-American Forum Case-... - 0 views

  •  
    This is an abstract (full article available at end of abstract as pdf) published in the open access Journal: International Journal of Emerging Technologies in Learning.
Barbara Lindsey

A Brief Interview with Michael Wesch (The Creator of That Wonderful Video...) - John Ba... - 0 views

  • The Web speeds up the process of rebuttal, reply, and revision and calls forth a different approach. The radically collaborative technologies emerging on the Web create the possibility for doing scholarship in the mode of conversation rather than argument, or to transform the argument as war metaphor into something that suggests collaboration rather than combat. Personally, I prefer the metaphor of the dance and that we are all here in this webscape dancing and playing around with ideas. The best dancers are those that find a way to “lose themselves” in the music – pushing the limits of the dance without fear of tripping or falling because they know that it is all part of the dance.
  • On the next 10-20 years and social networking ... I think this will greatly depend on the structure of those social networking tools and what kinds of communication are made possible with these tools. For example, on Facebook there are “walls” and “discussion groups.” Both of these sections are for human communication, but they are structured differently and therefore elicit different kinds of conversations. Furthermore, they are used in ways beyond how they were intended. Even now, as I am answering multiple questions with one long comment at the bottom of a blog post, the structure of the medium is in some way affecting how I am responding. On a forum I would address each question individually in separate threads. These seemingly minor differences are important because all human relationships are mediated by communication.
    • Barbara Lindsey
       
      "All human relationships are mediated by communication."
  • if there is a global village, it is not a very equitable one, and if there is a tragedy of our times, it may be that we are all interconnected but we fail to see it and take care of our relationships with others. For me, the ultimate promise of digital technology is that it might enable us to truly see one another once again and all the ways we are interconnected. It might help us create a truly global view that can spark the kind of empathy we need to create a better world for all of humankind.
  • ...2 more annotations...
  • First, everything including the environment, technology, economy, social structure, politics, religion, art and more are all interconnected. As I tried to illustrate in the video, this means that a change in one area (such as the way we communicate) can have a profound effect on everything else, including family, love, and our sense of being itself.
  • wanted to show people how digital technology has evolved and give them a sense of where it might be going and to give some momentum to the all-important conversation about the consequences of that on our global society.
  •  
    Michael Wesch explains the purpose of his video, The Machine is Us/ing Us
Barbara Lindsey

10 Rules of Teaching in this Century -- Campus Technology - 0 views

  • the knowledge developed during the course does not pre-exist the course. Second, since the knowledge of the course does not exist before the course (because you and the students develop the knowledge during the course), your chief challenge is to manage the process of knowledge discovery.
  • Now, because learning resources and opportunities are infinite, make the move: Don’t just tell students the key knowledge in your field, but help them discover it through problem-based active learning. Change your curriculum from a list of what you will say to a list of essential problems (or questions) that students will address, with your guidance, throughout the semester.
  • It may well be better to re-state learning outcomes in terms of essential problems and the research associated with those essential problems, and build rubrics based on the problems within a problem-based learning structure.
  • ...3 more annotations...
  • Move most assessment activity away from testing and toward evaluation of student evidence of learning.
  • In the new paradigm of active and varied learning, testing is less appropriate but assessing student evidence is more appropriate.
  • You, as a faculty member, must be as adept as your students in using Web-based applications, and there is no better way to learn the new breed of applications than to use them yourself for important professional purposes.
  •  
    Talks about how we now can really walk the walk and have a learner-centered environment and the technologies nec. to support that.
Barbara Lindsey

The Newest Media and a Principled Approach for Integrating Technology Into Instruction ... - 0 views

  • Given the evolution of new media, how can educators determine what to use, when, and why? Hence, our guiding question is, how should educators assess the effectiveness of new media using performance-based measures—not relying only on the often-used survey of student satisfaction?
  • One strategy we employ applies equally to any new approach in teaching, whether it employs “new media” or not. That strategy is to apply some of the best current knowledge from cognitive and learning sciences to assess proposed teaching innovation.
  • What is the educational need, problem, or gap for which use of new media might potentially enhance learning?
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

The Newest Media and a Principled Approach for Integrating Technology Into Instruction ... - 0 views

  •  
    Provides set of questions based on research from the cognitive and learning sciences to assess any new teaching approach.
Barbara Lindsey

The Newest Media and a Principled Approach for Integrating Technology Into Instruction ... - 0 views

    • Barbara Lindsey
       
      These and question one on previous page are useful frames for guiding use of newer technologies
  • However “technocool” or visually attractive or absorbing a piece or collection of new media is, unless its instructional application plausibly justifies an answer of “yes” to the questions above, prima facie it is unlikely to affect educational outcomes. In contrast, if a proposed use warrants an answer of “yes” to one or more of the questions above, it stands a chance of making a difference.
Barbara Lindsey

7 Things You Should Know About... | EDUCAUSE - 0 views

  •  
    A series provides concise information on emerging learning technologies and related practices. Each brief focuses on a single technology or practice and describes: What it is How it works Where it is going Why it matters to teaching and learning
Barbara Lindsey

News: Hitting Pause on Class Videos - Inside Higher Ed - 0 views

  • if the profit margin that commercial publishers obtain from institutions that support the faculty in their research, and then, ironically, buy it back at exorbitant expense were revealed and better understood as a significant and unnecessary drain on our meager resources, higher education leaders might be able to use the opportunities that technology now offers to by-pass these publishers, perhaps manage our own scholarly publications and certainly avoid this extraordinary expense in the name of the common good that education offers society.
  • They are clearly intending to argue that ripping DVDs to put them online for a course involves defeating a technological protection measure (CSS, to be exact), and that is illegal under the DMCA and trumps any claim of fair use (even for libraries making preservation copies under section 108). If this goes to court, expect AIME to claim that UCLA violated the DMCA the second they moved content from a DVD to a hard drive.
  •  
    Copyright is not slavery, to be sure, but it is among many things: a property right of sorts although NOT just like physical property or its concomitant legal regime; shaped -- and disrupted -- by technology repeatedly over time; and, finally, given its relationship to research, learning and free speech, most definitely a civil rights issue of our time.
Barbara Lindsey

The iPad and Information's Third Age | Open Culture - 1 views

  • Though the university initially fought its introduction, the printed textbook provided broad access to information that, for the first time, promised the possibility of universal education.
  • A barrier of symbolic complexity emerged between people and information for one of the first times in history. And the superabundance of information created a world that by necessity had to be divided into smaller and smaller subsections for organizational reasons. As people began to feel increasingly disconnected from information and as its relational and contextual aspects began to fade, we saw a transformation in teaching and learning. Hands-on apprenticeships and small teacher/student cohorts began to disappear, replaced by teachers delivering carefully parsed and categorized information to “standardized” students, all while trapped in classrooms isolated from the world in order to limit “distraction.”
  • It has become virtually impossible for a person to assess the quality, relevance, and usefulness of more information than she can process in a lifetime. And this is a problem that will only get worse as information continues to proliferate. But a quick look at popular technologies shows some of the ways people are working to address it. Social networking leverages selected communities to recommend books, restaurants, and movies. Context- and location-aware applications help focus search results and eliminate extraneous complexity. And customization and personalization allow people to create informational spaces that limit the intrusion of informational chaos.
  • ...9 more annotations...
  • Any genuine solution will have to address the problems of the current informational age — and it will need to continue answering the problems of the previous informational ages. From what I’ve seen, Apple’s new iPad is the first device to promise this (even if that promise isn’t yet fully realized). That is what makes it such a compelling candidate to be the first platform that serves true digital books.
  • Books that are static, don’t allow customization, don’t connect with other information on the device, and don’t leverage social connectivity aren’t the future, no matter how sophisticated the device that serves them. They’re simply the past repackaged.
  • Given what I’ve seen of its features and approaches, the iPad shows the promise to engender such a change, though much development will have to take place for it to realize its potential. Nonetheless, the innovation it offers in three critical areas is especially compelling: accessibility, participation, and customization. Central to all three of these is the fact that the iPad is not a single-use, standalone device; it’s a powerful, converged platform with robust development tools and capabilities.
  • I would argue that the key accessibility feature of the iPad is its apparent “lack” of an interface (a feature Apple’s marketing is working hard to underscore). Unlike all of the other similar devices (including those running Apple’s standard OS), which require users to learn to negotiate complex symbolic interfaces — files, folders, hierarchies, toolbars, navigational buttons — the iPad limits or even eliminates these in favor of touch, an approach intuitive even to those too young to read.
  • The collapsing of symbolic complexity into the simplicity of touch enables participation by new groups of people — even relative technophobes — and this mirrors the increased accessibility offered by Gutenberg’s revolution while lowering the barrier characteristic of most recent technologies.
  • For those interested in culture and creativity, this is an exciting prospect.
  • In Gutenberg’s case, the increase in accessibility led to a dramatic increase in cultural participation, and this is another way the iPad differentiates itself from many of its peer devices.
  • Put in the hands of readers and students, the robust capabilities of its new version of iWork, combined with access to the complete range of apps on the App Store and an entirely new generation of native apps, the iPad could provide access to professional-quality creative tools that empower a new set of participants
  • the iPad’s blend of social and contextual technologies and its ease of customization offer useful ways for the device to help users sort, focus, and control the information around them. The iPad’s networking capabilities, linked to a new generation of digital books, could help people discover both new texts and the members of a discussion group who could help them process what they’re reading. Combined with a portable format that allows readers to carry their books into various contexts, this could be incredibly powerful. One imagines, for example, a field-guide to forests linked to live discussion partners, allowing a reader to discover the forest in a new and engaging way that offers the advantages of both the first and second informational ages. Yet this sort of capability also reveals an area where the iPad falls surprisingly short: its lack of a camera (let alone two, one forward and one backward facing) means the device has limited capabilities for interesting emerging technologies like augmented reality — a staple of recently-developed apps. In terms of future eBooks, a volume of Hemingway that could alert readers that they were only two blocks from the café Les Deux Magots, for example, and offer an augmented tour of the place or that could direct the reader of Brontë to a moor would be transformational indeed. Perhaps we’ll see such capabilities on iPad 2.0.
Barbara Lindsey

Will Your College Be Covered in Virtual Graffiti? - Technology - The Chronicle of Highe... - 2 views

  • It's a lot easier to get ahead of the curve and to guide people into some of these technologies, as opposed to after the fact going back and trying to correct" their behavior, says the interactive-media manager.
  • Universities are still figuring out how to deal with Facebook and Twitter and other interactive programs which, like much of what's called Web 2.0, are largely out of their control. Now they'll have to wrestle with the power and pitfalls of an even more in-your-face social-media tool.
  • The University of Texas at Dallas is taking a different approach. Lately the 16,000-student state university has become a laboratory for what happens when students and professors go wild with unofficial tagging.
  • ...4 more annotations...
  • If you're scratching your head wondering what this has to do with education, here's Mr. Terry's answer: The technology will, he says, transform disciplines.
  • Perry Hewitt, digital-communications director at Harvard, says privacy is a serious issue. She also points out that similar sky-is-falling predictions were raised when the answering machine was introduced.
  • Mr. Terry's students will present a smartphone application they have built, called Placethings, which lets you tie pictures, video, and audio to locations and map that multimedia trail into a narrative.
  • Gartner, a technology-research company, forecasts that by 2013 mobile phones will pass personal computers as the most common way people worldwide get access to the Internet. But the practice of cellphone users' tying content to place is so new that you can really believe only one prediction with much confidence. Which is this: As location tagging goes more mainstream in the next few years, today's efforts will look trivial.
  •  
    Thx to @academicdave
Barbara Lindsey

Networked Learners | Pew Research Center's Internet & American Life Project - 0 views

  •  
    In the opening keynote, "Networked Learners," Lee Rainie discusses the latest findings of the Pew Research Center's Internet & American Life Project about how teenagers and young adults have embraced technology of all kinds - including broadband, cell phones, gaming devices and MP3 players. He describes how technology has affected the way "digital natives" search for, gather and act on information.
‹ Previous 21 - 40 of 449 Next › Last »
Showing 20 items per page