Skip to main content

Home/ EdTechTalk/ Group items tagged Year

Rss Feed Group items tagged

anonymous

LearningBeyondBoundaries » The Conversation - 4 views

  • Part of the Story While I was at ASCD 2008 in New Orleans in March 2008, I started a conversation with some ASCD Leadership Council members and my online network of educators about the need for educators familiar with Web 2.0 pedagogies to spread the word about how they are successfully using the new 21st Century technology to improve student learning. That conversation has continued until today, April 3, 2008. We have less than a month to pool our collective intelligence to help ASCD do a "bang up" job for it's membership in Orlando in March 2009 on technology and engaging students in learning. See the home page of this wiki for more details. Go here to read the conversation as it developed on Professional Development 2.0 from March 16, 2008 to April 3, 2008 when I then created this wiki. Join this wiki and help us develop a comprehensive proposal. In the process we will show how the online nextwork of educators works. If nothing else, at least that will be impressive. If you help out!
  • Thank you for connecting through Twitter. You have really hit the nail on the head that the Web 2.0 tools are not meeting mainstream, and I am right there, we need to change that!
  • While I was at ASCD 2008 in New Orleans in March 2008, I started a conversation with some ASCD Leadership Council members and my online network of educators about the need for educators familiar with Web 2.0 pedagogies to spread the word about how they are successfully using the new 21st Century technology to improve student learning. That conversation has continued until today, April 3, 2008. We have less than a month to pool our collective intelligence to help ASCD do a "bang up" job for it's membership in Orlando in March 2009 on technology and engaging students in learning. See the home page of this wiki for more details. Go here to read the conversation as it developed on Professional Development 2.0 from March 16, 2008 to April 3, 2008 (Dennis Update - ongoing as of 4.17.08) when I then created this wiki. Join this wiki and help us develop a comprehensive proposal. In the process we will show how the online nextwork of educators works. If nothing else, at least that will be impressive. If you help out!
  • ...12 more annotations...
  • There are a number of ways in which technology can better facilitate the learning of adults: Email, iChat/IM, Twitter: connects learners as collaborators Blogs: provides a forum for reflection and discussion Wikis/Google Docs/Zoho: provides a place to co-learn and build shared knowledge. Shared server/network space: provides a place for learners to swap/store documents iPods/MP3 players: allows anytime/anywhere learning Moodle/Blackboard: a place to learn from instructor-assigned tasks and discussions Interactive technology: (student response systems and interactive boards) engages adult learners in much the same way as students Online survey tools: collect opinions and perceptions Social Bookmarking tools: helps to share the knowledge RSS: critical tool for managing information. Digital cameras (still and video): use to record learning for later playback/review. Online streaming (uStream): collaborate online during a presentation, revisit the archive later. Nings; places like this to brainstorm and share strategies. Web: unlimited possibilities!
  • I agree with your thinking that the tech presentations need to move to other conferences. Thanks for starting that shift.
  • This is something I have seen at many conferences and I am glad you are making it more obvious to others! One of my niches is using technologies with young children... when I spoke as a featured speaker at FETC (Florida) this year there were only 3 sessions for early learning... so when we add to ASCD, let's also remember to add content for elementary!! I can add an application or two myself. Do you have any specific pointers to help us add more technology, especially Web 2.0 to ASCD?
  • The field on Web 2.0 is wide open for ASCD 2009. See here. I can tell you that 2009 at the annual conference will be different if we "seize the day." ASCD is ready to embrace a new definition of literacy for the 21st Century at its annual convention in Orlando, but they need our help. It's now time for those whose pedagogies utilize web 2.0 tools to send the word out to their networks to submit proposals by May 1. I also agree on a stronger focus on elementary programming is also needed.
  • Hi Dennis, Are you on the committee or have some strong influence to be sure the proposals get accepted?
  • Hi Charlene, It's not that simple. In life nothing worth having ever is. Hope this helps. I'm also going to post more on my blog so I can explain the context, but I can start the conversation by saying a few things here. - I am president of the Massachusetts affiliate of ASCD, - I am on the ASCD Leadership Council. - I attended the Position Statement Committee discussion in New Orleans, ASCD 2008, last month on 21st Century education and was a strong advocate for ASCD beginning to help the staff, leadership and membership understand Web 2.0 pedagogies. - I advocated in the same fashion for Web 2.0 pedagogies with Valerie Truesdale, current President of ASCD. - Valerie pointed out that ASCD 2009 has a major theme on technology, **Imagine: Connecting Learners in an E-World**, and a major theme of engagement, **Imagine: Challenging Minds to Engage and Learn More Deeply**. Based on what I know, I am optimistic that ASCD is ready for our message. I still have work to do, but if I have the names of a network of presenters like you, Gail and others interested with solid proposals, I will approach ASCD to advocate for an understanding of how significant our contribution could be on ASCD 2009. It would obviously help if I had ten or more people so I could say, "Hey, look at us; we have something to offer ASCD that will move the educational technology strand from successful to significant! Not sure what will come of it, but it sure beats complaining that no one listens to us. Dennis
  • Dennis, Thanks for the encouraging information. I think that in the past some technology-rich presenters have felt discouraged by not having applications accepted. I will apply and also encourage others to do so!
  • Now if I'm going to advocate for you and others who apply, I think it would help for me to know who applies and what the proposals look like. It would also makes sense for people not to duplicate similar topics. How can we orchestrate that?
  • Well, let's see, we can use Twitter, this site, and others to gather information about people planning to apply OR perhaps a more proactive approach -- offer to ASCD some expertise in helping them fill a technology-infused or technology-rich strand by helping them select the sessions which will be hosted in a specific room or rooms throughout the conference (thus pooling the higher technology needs (high speed internet and projectors, sound, IWB or whatever) into a specific set of rooms. We could serve to help them make this a dynamic, meaningful and important part of their conference. We could help them balance grade levels, technologies, levels of experience required of participants, etc.... I wonder what others think...
  • Great ideas, almost create a "package" of well balanced presentations, balanced grade levels and interest. I like Gail's thinking about hosting in specific rooms using appropriate technology that helps spread the message. For example instead of going to an IWB session, actually see the board in action during a presentation. I would also like to extend the buzz by having "meet-ups" or a networking sessions on various topics. These could be informal sessions to promote conversations. I will be working on topic ideas this week.
  • I do like this idea - a bit like NECC's OpenSource Lab concept. A suite of Web 2.0 tools demonstrated and presented.
  • I think we need to LEAD with the content (curriculum, learning, etc) and USE the tools as much as possible and then intersperse that a bit with the tool "how tos" and "whiz bang"... this conference will draw people who want to learn about using technologies IN curriculum and not so much the techies, at least that would be my first take. We may have sessions that people come to to find out the basics (Like "What IS Web 2.0?") but perhaps MORE who wonder about having learners participate in global learning communities or who ponder making curriculum more differentiated through technology.... it will be important to not ONLY "preach to the choir" of the technology-lovers at ASCD, but to snag a few through the content... am I making any sense?
  •  
    While I was at ASCD 2008 in New Orleans in March 2008, I started a conversation with some ASCD Leadership Council members and my online network of educators about the need for educators familiar with Web 2.0 pedagogies to spread the word about how they are successfully using the new 21st Century technology to improve student learning. That conversation has continued until today, April 3, 2008. We have less than a month to pool our collective intelligence to help ASCD do a "bang up" job for it's membership in Orlando in March 2009 on technology and engaging students in learning. See the home page of this wiki for more details.
careerdecision

Top 7 LinkedIn Voices and Influencers | Markets - 1 views

  •  
    INDIA, April 4, 2021 - The use of LinkedIn in recent years has grown exponentially, and the number of reach and business platforms on the platform keeps skyrocketing. Prominent entrepreneurs and personalities are using the platform.
careerdecision

Top 7 LinkedIn Voices and Influencers - 1 views

  •  
    INDIA, April 4, 2021 - The use of LinkedIn in recent years has grown exponentially, and the number of reach and business platforms on the platform keeps skyrocketing. Prominent entrepreneurs and personalities are using the platform.
Floyd Sutton

Types of Content Theft - 2 views

  •  
    BT newbies can ought to actively value more highly to amendment the settings. The company is additionally introducing new BT Parental Controls that transcend the remit of its current free privacy controls, that solely specialize in desktops and laptops. The new controls can cowl all internet-connected devices within the home, together with tablets, game consoles, and smartphones. New customers, says BT in a very promulgation, "[will] ought to build a alternative on whether or not or to not activate the parental controls once putting in place their web affiliation for the primary time," adding that "the possibility of getting the controls enforced is pre-selected." you will either ought to make sure that you are pleased with the pre-selected protection level, or actively value more highly to amendment the settings, that BT is keen to cue you would possibly expose you to "content doubtless unsuitable for kids." "BT takes the difficulty of on-line kid protection extraordinarily seriously, and that we area unit very happy to be able to launch the whole-home filter to assist folks keep their families safe on-line. It adds to the numerous tools we have a tendency to already build accessible for gratis to our customers. We've been targeted on the difficulty of on-line safety since we have a tendency to developed the globe's 1st Cleanfeed filter to dam ill-usage pictures and created the technology accessible liberated to different ISPs across the world a decade past," says Pete Oliver, MD of client industrial selling and digital at BT.
  • ...2 more comments...
  •  
    Coleaks SMS Bomber New 2013: New 2013.... New
  •  
    PRO FACEBOOK HACKS Hello My Friends! If you are currently on this site it is because you are looking for a way to hack the password of a facebook account. You've probably lost a lot of time looking at other sites for the best way to hack a facebook account, but unfortunately, it did not really help you. To save you even more time, all you can find on other sites as solutions are phishing, keyloggers, social engineering and hacking of the email address of facebook account (if known), these methods work, but not for everyone and are very difficult to implement. The common reasons that make you want to hack a facebook are the following: Cheating partner suspicion Recovery of a lost/hacked password Monitoring of children activity Revenge on someone Simple curiosity Well, let us congratulate you because you just found the right place! Our site dosen't put you to download thousand of tools for a lot of money. Our website is an ON-LINE tool and you have just to enter the victim FB URL, and it will return you the victim password. So... What we waiting for...?
  •  
    As Gen. Alexander prepares to retire, Obama administration seeks one replacement. The White House has some big positions to fill in the Defense Department and at the National Security Agency (NSA) this coming spring. But as The Washington Post reports, they'll be looking for just a single person to fill them all. Since the creation of the US Cyber Command (USCYBERCOM), the Department of Defense's joint command in charge of operating and defending the military's network, one man has been at the helm: US Army General Keith Alexander. Alexander is also Director of the National Security Agency and the Chief of Central Security Service. Those combined roles have put responsibility for a huge swath of the US military's "network warfare" under a single man's purview-a concentration of power that has caused a great deal of concern. In fact, the Director of the Office of National Intelligence and the panel appointed by President Obama to review the operations of the NSA have both recommended that the NSA and the DOD's Cyber Command be put under separate leadership. The review panel, appointed in the wake of leaks from former NSA contractor Edward Snowden, submitted a draft recommendation to President Barack Obama recommending that a civilian should be appointed head of the NSA, while Cyber Command should remain under military leadership. But the Obama administration has ignored that advice, announcing that it will continue the arrangement that let Alexander command most of the nation's military and civilian offensive and defensive cyber capabilities. "Following an interagency review," White House spokeswoman Caitlyn Hayden wrote in an email to the Post, "the administration has decided that keeping the positions of NSA Director and Cyber Command Commander together as one, dual-hatted position is the most effective approach to accomplish both agencies' missions." The NSA has been under a military commander since its inception. But General Alexander is the highest-ranking mi
  •  
    Types of Content Theft CAMCORDER THEFT Approximately ninety percent of newly released movies that are pirated can be traced to thieves who use a digital recording device in a movie theater to literally steal the image and/or sound off the screen. Camcorder theft is one of the biggest problems facing the film industry. All it takes is one camcorder copy to trigger the mass reproduction and distribution of millions of illegal Internet downloads and bootlegs in global street markets just hours after a film's release and well before it becomes available for legal rental or purchase from legitimate suppliers. Studios and theater owners have significantly increased security and surveillance in theaters all over the world to thwart would-be camcorders. Since 2003, the major motion picture studios have employed technology such as watermarking films, which enables film companies to discern the source of a stolen film through forensic analysis and trace it back to the very theater in which it was recorded. PEER-TO-PEER (P2P) THEFT A peer-to-peer (P2P) network is a system that enables Internet users through the exchange of digital files among individual computers or "peers" to (1) make files (including movies and music) stored on their computer available for copying by other users; (2) search for files stored on other users' computers; and (3) transfer exact copies of files from one computer to another. P2P technology itself is not illegal and may be useful for many legal purposes, but people often use the technology to illegally exchange copyrighted material on the Internet. While people may believe their files are being exchanged among only a few "friends," these files can be accessed by millions of people around the world who are part of the same P2P network. If you download movies using illegal peer-to-peer sites, you are often also distributing illegal content, as the default setting of most P2P networks ensures that individuals downloading files from the network ar
popularcoder

An Amazon of Online marketing: One Stop I 88Gravity - 0 views

  •  
    We are 88Gravity based out of milieu. We provide elegant digital experiences. We provide thoughtful digital experiences and beautiful brand aesthetics. We are pretty young with a combined experience of just above 30 years in digital marketing but we believe there is a better way to do marketing. A more valuable, less invasive way where customers are earned rather than bought. We're obsessively passionate about it and help people achieve it. We focus on Search Engine Optimization. SEO is one of the least understood & least transparent aspects of great marketing, and we see that as an opportunity.
uflowit8

Happy New Year - 0 views

  •  
    From Uflow Automaiton India Our Site: http://uflowvalve.com
uflowit8

Happy New Year - 0 views

  •  
    From Uflow Automaiton India Our Site: http://uflowvalve.com
lasttopic

Facebook's 'GlobalCoin' cryptocurrency to launch in 2020, report claims - 0 views

  •  
    Facebook plans to launch its cryptocurrency by the first quarter of next year, reports BBC News.
shikhaar

Center for Mental Health and Well Being | Nupur Dhakephalkar - 0 views

  •  
    "Dr. Nupur Dhakephalkar is the best therapist in Pune, India. She has an excellent work experience of 5 years in Clinical Psychology. She is the founder of the Center for Mental Health-founded in January 2018. Brain injury, damage, neurodegenerative disorders, neurodevelopmental disorders, and severe mental illnesses have an impact on cognition and neuropsychological tests are used to examine these impacts."
pegalogics

Advantages of UX Research & Why Startups Are Scared to Invest In The Same | Pegalogics| - 0 views

UX Research is researching and analyzing the target audience. Comprehending their behavioral habits, knowledge, dealings, and emotion towards your property and the mindset they come with when borro...

#topuiuxcompaniesinindia #userexperiencedesignagency #uiuxdesignagencyinindia ##uxagency

started by pegalogics on 08 Oct 21 no follow-up yet
johnsaolivers

How to track cell phone wihtout knowing and how to protect yourself from spying? - 6 views

A few years ago if somebody told me that it is so easy to spy on my app I could laugh but nowadays I realize that it is more than possible. Everywhere I go, Every website I visit, and every app or ...

spy apps

started by johnsaolivers on 11 Aug 21 no follow-up yet
johnsaolivers liked it
bengalic

How to Complete the Most of Online Shopping in Bangladesh? - 2 views

The evolution of the internet has completely transformed the traditional shopping experience. People can now find products worldwide and shop instantly, with payments made within seconds. They also...

online retail grocery e-commerce

started by bengalic on 16 Apr 22 no follow-up yet
jsohan

Worldcoin: the first eyeball scanning cryptocurrency - 0 views

  •  
    One of the latest experiments is Worldcoin, a cryptocurrency that verifies user identities through iris scanning. Cryptocurrencies have exploded in popularity in recent years. As the industry continues to evolve, developers keep innovating new technologies and models.
hsjfabrication

medical equipment metal fabrication - 1 views

  •  
    HSJ metal parts can be offered to the Medical area and we have been make the parts for over 5 years. We are very strict in purchasing raw materials, which meet the medical standards. HSJ has advanced Nissan bending equipment, professional team and technology to manufacture precision sheet metal, professionally custom-made steel sheet aluminum sheet parts, power box, computer case, casing, printer parts, and other precision manufacturing sheet metal. Our production techniques include: laser cutting, welding, CNC forming, CNC punching, etc. Regarding the medical chassis cabinet customization service, we hope that you provide the drawings, we will make them for you. From the drawings, to the cutting, we will provide technical guidance for your products to make your products more perfect.
hsjfabrication

sheet metal welding drawing - 1 views

  •  
    Sheet metal welding has argon arc welding, laser welding, spot welding, carbon dioxide protection welding, stainless steel sheet welding, aluminium sheet welding manual arc welding, etc. With the advent of technology, the process of sheet metal welding has evolved over the years. As one of the professional sheet metal components companies, HSJ Metal Fabrication, understands the differences between the existing welding techniques. That's why we can make a wise decision when it comes to picking the right welding technique for any projects from our customer.
carbonpp

Bio Plastics in Packaging: A Greener Future - 0 views

image

started by carbonpp on 15 Sep 23 no follow-up yet
learnnovators

INFOGRAPHIC: High Performance Learning Ecosystems - 8 views

  • RT COLLABORATIVE NETWORKS ENHANCED WORKFLOW   x—–x—–x—–x—–x Designed by our Guest Blogger, Arun Pradhan Arun Pradhan has over 17 years’ experience in digital and blended learning. He currently works as a senior Learning & Performance consultant at DeakinPrime, helping to deliver 70:20:10 inspired solutions for some of Australia’s largest telcos, retailers, banks and insurers. In his spare time Arun blogs about learning, performance and 70:20:10 solutions at Design4Performance. x—–x—–x—–x—–x Copyright of posts written by our Guest Bloggers are their own. Published on 19-May-2016   Tin Can API & the Future of E-Learning
  •  
    In the previous post arun written about the need to design learning & high-performance ecosystems here, and have been reflecting on some common ingredients for effective ones.
  •  
    In the previous post arun written about the need to design learning & high-performance ecosystems here, and have been reflecting on some common ingredients for effective ones.
verifiedpaxful0

Buy Verified Crypto Accounts - 100% US UK Active Old Account - 0 views

  •  
    Buy Verified Crypto Accounts Are you looking for the best Buy Verified Crypto Accounts in the market? Crypto Accounts has become a popular payment app in recent years, used by individuals and businesses alike. That's where buying a Verified Crypto Accounts comes in. By purchasing an account from a reputable seller, users can unlock features such as higher transaction limits and the ability to withdraw funds to a bank account.
verifiedpaxful0

Buy Verified Wise Accounts - 100% Best Fully KYC Verified - 0 views

  •  
    Buy Verified Wise Accounts Are you looking for the best Buy Verified Wise Accounts in the market? Wise Accounts has become a popular payment app in recent years, used by individuals and businesses alike. That's where buying a Verified Wise Accounts comes in. By purchasing an account from a reputable seller, users can unlock features such as higher transaction limits and the ability to withdraw funds to a bank account.
« First ‹ Previous 201 - 220 of 241 Next › Last »
Showing 20 items per page