Skip to main content

Home/ Diigo In Education/ Group items tagged data

Rss Feed Group items tagged

Gary Bertoia

Data Reveals Stories: Part One | Why do data differently? - Ewan McIntosh | Digital Med... - 1 views

  •  
    Great series on Data 
Tonya Thomas

Future Work Skills 2020 - 3 views

  • Transdisciplinarity: literacy in and ability to understand concepts across multiple disciplines. More about transdisciplinarity.Virtual collaboration: ability to work productively, drive engagement, and demonstrate presence as a member of a virtual team. More about virtual collaboration.Sense-making: ability to determine the deeper meaning or significance of what is being expressed. More about sense-making.Social intelligence: ability to connect to others in a deep and direct way, to sense and stimulate reactions and desired interactions. More about social intelligence.Cross-cultural competency: ability to operate in different cultural settings. More about cross-cultural competency.Cognitive load management: ability to discriminate and filter information for importance, and to understand how to maximize cognitive functioning using a variety of tools and techniques. More about cognitive load management.Novel and adaptive thinking: proficiency at thinking and coming up with solutions and responses beyond that which is rote or rule-based. More about novel and adaptive thinking.Computational thinking: ability to translate vast amounts of data into abstract concepts and to understand data-based reasoning. More about computational thinking.New media literacy: ability to critically assess and develop content that uses new media forms, and to leverage these media for persuasive communication. More about new media literacy. More about new media literacy.Design mindset: ability to represent and develop tasks and work processes for desired outcomes. More about design mindset.
  •  
    "Transdisciplinarity: literacy in and ability to understand concepts across multiple disciplines. More about transdisciplinarity. Virtual collaboration: ability to work productively, drive engagement, and demonstrate presence as a member of a virtual team. More about virtual collaboration. Sense-making: ability to determine the deeper meaning or significance of what is being expressed. More about sense-making. Social intelligence: ability to connect to others in a deep and direct way, to sense and stimulate reactions and desired interactions. More about social intelligence. Cross-cultural competency: ability to operate in different cultural settings. More about cross-cultural competency. Cognitive load management: ability to discriminate and filter information for importance, and to understand how to maximize cognitive functioning using a variety of tools and techniques. More about cognitive load management. Novel and adaptive thinking: proficiency at thinking and coming up with solutions and responses beyond that which is rote or rule-based. More about novel and adaptive thinking. Computational thinking: ability to translate vast amounts of data into abstract concepts and to understand data-based reasoning. More about computational thinking. New media literacy: ability to critically assess and develop content that uses new media forms, and to leverage these media for persuasive communication. More about new media literacy. More about new media literacy. Design mindset: ability to represent and develop tasks and work processes for desired outcomes. More about design mindset."
smilex3md

Quandl - Find, Use and Share Numerical Data - 52 views

  •  
    Hi Professor Neustadtl, I have developed a repository for sociology data tailored for researchers, and especially students.  The site is open and free, and has over 3 million social, financial, and economic time series datasets available for downloading.  Importantly, the ease by which a user can find, trim, transform, merge, and download time series data from www.quandl.com is in my opinion, unmatched elsewhere. My hope is that you will visit the site briefly, and perhaps offer me some feedback.  More information about the service is below. I've also included my LinkedIN profile should you be weary of my intentions with this email. www.quandl.com/academics with thanks, Tammer -- Tammer Kamel tammerk@quandl.com http://www.quandl.com http://www.linkedin.com/in/tammerkamel/
Lisa C. Hurst

Inside the School Silicon Valley Thinks Will Save Education | WIRED - 9 views

  •  
    "AUTHOR: ISSIE LAPOWSKY. ISSIE LAPOWSKY DATE OF PUBLICATION: 05.04.15. 05.04.15 TIME OF PUBLICATION: 7:00 AM. 7:00 AM INSIDE THE SCHOOL SILICON VALLEY THINKS WILL SAVE EDUCATION Click to Open Overlay Gallery Students in the youngest class at the Fort Mason AltSchool help their teacher, Jennifer Aguilar, compile a list of what they know and what they want to know about butterflies. CHRISTIE HEMM KLOK/WIRED SO YOU'RE A parent, thinking about sending your 7-year-old to this rogue startup of a school you heard about from your friend's neighbor's sister. It's prospective parent information day, and you make the trek to San Francisco's South of Market neighborhood. You walk up to the second floor of the school, file into a glass-walled conference room overlooking a classroom, and take a seat alongside dozens of other parents who, like you, feel that public schools-with their endless bubble-filled tests, 38-kid classrooms, and antiquated approach to learning-just aren't cutting it. At the same time, you're thinking: this school is kind of weird. On one side of the glass is a cheery little scene, with two teachers leading two different middle school lessons on opposite ends of the room. But on the other side is something altogether unusual: an airy and open office with vaulted ceilings, sunlight streaming onto low-slung couches, and rows of hoodie-wearing employees typing away on their computers while munching on free snacks from the kitchen. And while you can't quite be sure, you think that might be a robot on wheels roaming about. Then there's the guy who's standing at the front of the conference room, the school's founder. Dressed in the San Francisco standard issue t-shirt and jeans, he's unlike any school administrator you've ever met. But the more he talks about how this school uses technology to enhance and individualize education, the more you start to like what he has to say. And so, if you are truly fed up with the school stat
Tara Heath

Hate Speech and Hate Crime | Advocacy, Legislation & Issues - 3 views

  • There is no legal definition of "hate speech" under U.S. law, just as there is no legal definition for evil ideas, rudeness, unpatriotic speech, or any other kind of speech that people might condemn. Generally, however, hate speech is any form of expression through which speakers intend to vilify, humiliate, or incite hatred against a group or a class of persons on the basis of race, religion, skin color sexual identity, gender identity, ethnicity, disability, or national origin. 1 In the United States, hate speech is protected by the First Amendment. Courts extend this protection on the grounds that the First Amendment requires the government to strictly protect robust debate on matters of public concern even when such debate devolves into distasteful, offensive, or hateful speech that causes others to feel grief, anger, or fear. (The Supreme Court's decision in Snyder v. Phelps provides an example of this legal reasoning.) Under current First Amendment jurisprudence, hate speech can only be criminalized when it directly incites imminent criminal activity or consists of specific threats of violence targeted against a person or group. Hate Crime For the purposes of collecting statistics, the FBI has defined a hate crime as a “criminal offense against a person or property motivated in whole or in part by an offender’s bias against a race, religion, disability, sexual orientation, ethnicity, gender, or gender identity,” including skin color and national origin.  Hate crimes are overt acts that can include acts of violence against persons or property, violation or deprivation of civil rights, certain "true threats," or acts of intimidation, or conspiracy to commit these crimes. The Supreme Court has upheld laws that either criminalize these acts or impose a harsher punishment when it can be proven that the defendant targeted the victim because of the victim's race, ethnicity, identity, or beliefs.  A hate crime is more than than offensive speech or conduct; it is specific criminal behavior that ranges from property crimes like vandalism and arson to acts of intimidation, assault, and murder.  Victims of hate crimes can include institutions, religious organizations and government entities as well as individuals.
  •  
    "Hate Speech There is no legal definition of "hate speech" under U.S. law, just as there is no legal definition for evil ideas, rudeness, unpatriotic speech, or any other kind of speech that people might condemn. Generally, however, hate speech is any form of expression through which speakers intend to vilify, humiliate, or incite hatred against a group or a class of persons on the basis of race, religion, skin color sexual identity, gender identity, ethnicity, disability, or national origin. 1 In the United States, hate speech is protected by the First Amendment. Courts extend this protection on the grounds that the First Amendment requires the government to strictly protect robust debate on matters of public concern even when such debate devolves into distasteful, offensive, or hateful speech that causes others to feel grief, anger, or fear. (The Supreme Court's decision in Snyder v. Phelps provides an example of this legal reasoning.) Under current First Amendment jurisprudence, hate speech can only be criminalized when it directly incites imminent criminal activity or consists of specific threats of violence targeted against a person or group. Hate Crime For the purposes of collecting statistics, the FBI has defined a hate crime as a "criminal offense against a person or property motivated in whole or in part by an offender's bias against a race, religion, disability, sexual orientation, ethnicity, gender, or gender identity," including skin color and national origin.  Hate crimes are overt acts that can include acts of violence against persons or property, violation or deprivation of civil rights, certain "true threats," or acts of intimidation, or conspiracy to commit these crimes. The Supreme Court has upheld laws that either criminalize these acts or impose a harsher punishment when it can be proven that the defendant targeted the victim because of the victim's race, ethnicity, identity, or beliefs.  A hate crime is more than than offensive speech
Michael Sheehan

Learning Never Stops: Find the Data - Easily Discover and compare information - 4 views

  •  
    An excellent resource to find and compare statistical data. Very useful for research.
Sharin Tebo

OPINION: Personalization, Possibilities and Challenges with Learning Analytics | EdSurg... - 34 views

  • Many of these challenges result from trying to personalize within the context of traditional school structures that standardize the curriculum, the assessments, the grouping, and the instructional time.
  • a genuine problem: how to achieve the tremendous academic gains that are possible through personalized instructional methods within the constraints of a traditional classroom.
  • Knowledge mapsFormalizing a learning map--sequences of connected concepts and skills that define how one masters a domain, such as beginning Algebra--and mapping student mastery on the map, enables intelligent learning systems to recommend the next concept or skill to be learned, propose aligned instructional content, and present appropriate questions and tasks to assess mastery.
  • ...3 more annotations...
  • Learning analytics combines data from student models with data on learning behaviors, knowledge maps, and learning outcomes, and mines these data sets to identify patterns that associate student attributes and behaviors with successful outcomes.
  • Learning analytics marks a significant departure from traditional data-driven instructional strategies. That’s because so much more data is available to mine, make sense of, and use.
  • It is not enough to design cutting edge analytics to shape educational decision making if we do not understand how teachers can apply them to optimize student learning outcomes.
  •  
    Learner analytics to help personalize learning
Siri Anderson

The Data That Turned the World Upside Down | Motherboard - 45 views

  •  
    This is very helpful for understanding how big data fits into our current reality.
trisha_poole

Online media use in Australia 2007- 2011 | Australian Policy Online - 15 views

  •  
    An interesting report with the most interesting data being that "100% of students are online in 2011". While the survey data is apparently representative of the Australian population, I would argue that this figure is not the case and that deeper research needs to be undertaken before these figures can be used as a foundation for embedding technology and internet into education. However, it does show the increasing rate of uptake of online activities within Australia and the trends for access information.
Jac Londe

Startup turns carbon dioxide into fuels - 1 views

  • Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels.
  • Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals.
  • Bocarsly likes to call the process "reverse combustion" because it is like running a burning reaction backwards. Instead of burning fuel and oxygen to produce CO2, the CO2 converts back into fuel and oxygen.
  • ...2 more annotations...
  • Cole set up a flask containing a solution of CO2 and a pyridinium catalyst dissolved in water. In place of sunlight, which emits a broad spectrum of wavelengths of light, she shined on the flask a blue light-emitting diode (LED) because it gives off certain wavelengths that are highly efficient at driving the reaction. In the flask she placed an electrode that is activated by particles of light, or photons. "We used a semiconductor electrode that would allow us to substitute light for electricity," said Cole.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications.
Dallas McPheeters

Intel: Light beams can replace electronic signals for future computers - SmartPlanet - 12 views

  • Here’s how it works, step by step: The transmitter chip is made of four hybrid silicon lasers. Light beams from the lasers each travel into an optical modulator. The modulator encodes data onto the beams at 12.5Gbps. The four beams are then combined and output to a single optical fiber, for a total data rate of 50Gbps. At the other end of the link, the receiver chip separates the four optical beams and directs them into photo detectors. The photo detectors convert data back into electrical signals.
    • Dallas McPheeters
       
      The future of fast computing using laser light to transfer data 50Gb/second.
  • a video explanation:
  • “silicon photonics,”
    • Dallas McPheeters
       
      Silicon Photonics making 1Tb/sec goal of data transfer affordable and within reach of mass consumer markets. Two videos here explain how it works in less than 2 mins each.
Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Andrew Williamson

Chucking a googly: when data is king, design goes out the door - 0 views

  • Bowman's main complaint is that in Google's engineering-driven culture, data trumps everything else. When he would make a design decision, no matter how minute, he was asked to back it up with data. Before he could decide whether a line on a web page should be three, four or five pixels wide, for example, he had to put up test versions of all three pages on the web. Different groups of users would see different versions, and their clicking behaviour, or the amount of time they spent on a page, would help pick a winner. "Data eventually becomes a crutch for every decision, paralysing the company and preventing it from making any daring design decisions," Bowman wrote.
Trevor Cunningham

kmlfactbook.org - 4 views

  •  
    View CIA data sets with Google Earth technology. Download data sets, generate kml files, and compare areas of the world easily.
  •  
    CIA World Factbook visualized interactively with Google Earth. Allows you to download .kml files for the data set of interest, as well as edit the style...wow.
  •  
    CIA World Factbook visualized interactively with Google Earth. Allows you to download .kml files for the data set of interest, as well as edit the style...wow.
D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Ed... - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
Martin Burrett

Worldmapper - The world as you've never seen it before - 175 views

  •  
    An interesting site showing useful world data as distorted world maps. Great for showing different data and ideas in a visual way. http://ictmagic.wikispaces.com/PSHE%2C+RE%2C+Citizenship%2C+Geography+%26+Environmental
Lisa DuFur

Mapping America - Census Bureau 2005-9 American Community Survey - NYTimes.com - 40 views

  •  
    Browse local data from the Census Bureau's American Community Survey, based on samples from 2005 to 2009. Because these figures are based on samples, they are subject to a margin of error, particularly in places with a low population, and are best regarded as estimates. Create tons of lessons around this data. WOW
Roland Gesthuizen

Action Research Projects for Teachers - 5 views

  •  
    Action research is a great solution teachers' questions  I highly recommend learning about it. .. By collecting data and analyzing the results, teachers can change their practices in the classroom as needed. The principle of action research is to plan a change, implement the change, collect any necessary information, and analyze what happened. Action research can make use of data already being collected or needed for classroom practice."
Sheri Edwards

Dotspotting - Welcome! - 65 views

  •  
    tools to help people gather data about cities and make that data more legible
Margaret FalerSweany

With Tech Taking Over in Schools, Worries Rise - NYTimes.com - 43 views

  • Technology companies are collecting a vast amount of data about students, touching every corner of their educational lives — with few controls on how those details are used.
  • growing parental concern that sensitive information about children — like data about learning disabilities, disciplinary problems or family trauma — might be disseminated and disclosed, potentially hampering college or career prospects.
  • implications beyond education.
  •  
    Discusses laws proposed in 16 states "prohibiting educational sites, apps and cloud services used by schools from selling or disclosing personal information about students from kindergarten through high school; from using the children's data to market to them; and from compiling dossiers on them."
« First ‹ Previous 41 - 60 of 535 Next › Last »
Showing 20 items per page