Skip to main content

Home/ EdTechTalk/ Group items tagged become

Rss Feed Group items tagged

J Black

The End in Mind » A Post-LMS Manifesto - 0 views

  • Technology has and always will be an integral part of what we do to help our students “become.” But helping someone improve, to become a better, more skilled, more knowledgeable, more confident person is not fundamentally a technology problem. It’s a people problem. Or rather, it’s a people opportunity.
  • The problem with one-to-one instruction is that is simply doesn’t scale. Historically, there simply haven’t been enough tutors to go around if our goal is to educate the masses, to help every learner “become.”
  • Through experimental investigation, Bloom found that “the average student under tutoring was about two standard deviations above the average” of students who studied in a traditional classroom setting with 30 other students
  • ...11 more annotations...
    • J Black
       
      I agree - for example, blogging within a LMS does not allow this, whereas blogging with a known host (Blogger, WP) does help students to connect with others inside and outside of the learning environment/institution.
    • J Black
       
      This is a very profound statement that we should closely look at. Do LMS do nothing more than perpetuate the traditional classroom model?
  • here is, at its very core, a problem with the LMS paradigm. The “M” in “LMS” stands for “management.” This is not insignificant. The word heavily implies that the provider of the LMS, the educational institution, is “managing” student learning. Since the dawn of public education and the praiseworthy societal undertaking “educate the masses,” management has become an integral part of the learning. And this is exactly what we have designed and used LMSs to do—to manage the flow of students through traditional, semester-based courses more efficiently than ever before. The LMS has done exactly what we hired it to do: it has reinforced, facilitated, and perpetuated the traditional classroom model, the same model that Bloom found woefully less effective than one-on-one learning.
  • Because the LMS is primarily a traditional classroom support tool, it is ill-suited to bridge the 2-sigma gap between classroom instruction and personal tutoring.
  • We can extend, expand, enhance, magnify, and amplify the reach and effectiveness of human interaction with technology and communication tools, but the underlying reality is that real people must converse with each other in the process of “becoming.”
  • undamentally human endeavor that requires personal interaction and communication, person to person.
  • n the post-LMS world, we need to worry less about “managing” learners and focus more on helping them connect with other like-minded learners both inside and outside of our institutions.
  • We need to foster in them greater personal accountability, responsibility and autonomy in their pursuit of learning in the broader community of learners. We need to use the communication tools available to us today and the tools that will be invented tomorrow to enable anytime, anywhere, any-scale learning conversations between our students and other learners
  • However, instead of that tutor appearing in the form of an individual human being or in the form of a virtual AI tutor, the tutor will be the crowd.
  • The paradigm—not the technology—is the problem.
  • Building a better, more feature-rich LMS won’t close the 2-sigma gap. We need to utilize technology to better connect people, content, and learning communities to facilitate authentic, personal, individualized learning. What are we waiting for?
    • J Black
       
      Bingo
  •  
    A very insightful look into LMS use and student achievment. Highly recommended read for users of BB or Moodle.
Sarah Usher

PoliceRecruitmentUK Helped Me Pass the Police Application Sift - 1 views

Becoming a police officer is my dream job. Since grade school I can only picture out myself as a police officer and so upon the first opportunity I applied at Wales in hopes to become a police offi...

become a police officer jobs recruitment

started by Sarah Usher on 07 Mar 11 no follow-up yet
Jeff Johnson

Grassroots Creativity: Helping Everyone Become a Creative Thinker by Dr. Mitchel Resnic... - 0 views

  •  
    Grassroots Creativity: Helping Everyone Become a Creative Thinker by Dr. Mitchel Resnick (MIT Media Lab)
J Black

The Three-E Strategy for Overcoming Resistance to Technological Change (EDUCAUSE Quarte... - 0 views

  • According to a 2007 Pew/Internet study,1 49 percent of Americans only occasionally use information and communication technology. Of the remaining 51 percent, only 8 percent are what Pew calls omnivores, “deep users of the participatory Web and mobile applications.”
  • Shaping user behavior is a “soft” problem that has more to do with psychological and social barriers to technology adoption. Academia has its own cultural mores, which often conflict with experimenting with new ways of doing things. Gardner Campbell put it nicely last year when he wrote, “For an academic to risk ‘failure’ is often synonymous with ‘looking stupid in front of someone’.”2 The safe option for most users is to avoid trying something as risky as new technology.
  • The first instinct is thus to graft technology onto preexisting modes of behavior.
  • ...6 more annotations...
  • First, a technology must be evident to the user as potentially useful in making his or her life easier (or more enjoyable). Second, a technology must be easy to use to avoid rousing feelings of inadequacy. Third, the technology must become essential to the user in going about his or her business. This “Three-E Strategy,” if applied properly, has been at the core of every successful technology adoption throughout history.
  • Technology must be easy and intuitive to use for the majority of the user audience—or they won’t use it.
  • Complexity, however, remains a potent obstacle to realizing the goal of making technology easy. Omnivores (the top 8 percent of users) revel in complexity. Consider for a moment how much time some people spend creating clothes for their avatars in Second Life or the intricacies of gameplay in World of Warcraft. This complexity gives the expert users a type of power, but is also a turnoff for the majority of potential users.
  • Web 2.0 and open source present another interesting solution to this problem. The user community quickly abandons those applications they consider too complicated.
  • any new technology must become essential to users
  • Finally, we have to show them how the enhanced communication made possible through technologies such as Web 2.0 will enhance their efficiency, productivity, and ability to teach and learn.
  •  
    First, a technology must be evident to the user as potentially useful in making his or her life easier (or more enjoyable). Second, a technology must be easy to use to avoid rousing feelings of inadequacy. Third, the technology must become essential to the user in going about his or her business. This "Three-E Strategy," if applied properly, has been at the core of every successful technology adoption throughout history.
rechalmax

How to Become an Aesthetician and Explore Your Job Options - 2 views

  •  
    Requirements to Become an Aesthetician are certified cosmetology experts who cleanse and deal with the pores and skin. https://higheducationlearning.com/aesthetician-how-to-become-an-aesthetician/
Hong Gan

Get $50 Bonus By Becoming A Discover CardMember - 0 views

  •  
    Discover has an exclusive deal just for you. Become a cardmember, get $50 Cashback Bonus with your first purchase, and earn unlimited rewards on all purchases. You'll also get amazing customer service and online tools that will make you a fan of Discover, too. To learn more or apply now http://discover.popularmedia.net/click/share/5dd3ae524a0b4267c081164ceadd226b
  •  
    this is easy
David Ellena

Building Technology Fluency: Preparing Students to be Digital Learners | Edutopia - 0 views

  • how much time is devoted to the development of their technology fluency?
  • a student with technology fluency navigates programs or apps quickly, completing tasks correctly and deliberately.
  • technology fluency, a student not only navigates within a single environment, but also begins to "demonstrate an ability to make effective choices and use the tools to advance their understanding and communication"
  • ...8 more annotations...
  • ultimate sign of technology fluency is the "ability to manipulate, transform and move information across various media and platforms"
  • A non-fluent student may be proficient in a single program or app, but not automatically see the connections to other content areas or different contexts.
  • 3 Strategies for Building Technology Fluency
  • 1. Flip (10) Your Lessons
  • 2. Create Scaffolded Challenges
  • These steps gave them enough scaffolding to get started and then teach themselves how to finish the project.
  • students would collaborate among themselves to navigate the rest of the challenge. By not providing students with specific steps, they learned to read menu items, access help, search for tutorials and become effective problem solvers, taking critical steps towards fluency.
  • 3. Empower Student Leaders
  •  
    Here are some steps to help students become tech fluent
sarahtarek

http://bgze.blogspot.com/2013/07/grim-becoming-2014.html - 0 views

مشاهدة تحميل فيلم A Grim Becoming 2014 مترجم

مشاهدة تحميل فيلم A Grim Becoming 2014 مترجم

started by sarahtarek on 17 Jul 13 no follow-up yet
Dave Truss

cuebc.ca - Have your ipod and listen to it too! Sonya Woloshen - 0 views

  • Many of my students have ipods. These mini music makers are captivating them…truth be told, my ipod touch captivates me!  I feel as though we could use these ipods to, not only increase the interest factor of lessons, but also to encourage students to become involved in their learning process.
  •  
    Many of my students have ipods. These mini music makers are captivating them…truth be told, my ipod touch captivates me! I feel as though we could use these ipods to, not only increase the interest factor of lessons, but also to encourage students to become involved in their learning process.
Dave Truss

jackiegerstein » 21st Century Learning Intelligences - 0 views

  • Skills such as global literacy, computer literacy, problem solving, critical thinking, creativity, and innovation have become critical in today’s increasingly interconnected workforce and society (eSchool News).
  •  
    Skills such as global literacy, computer literacy, problem solving, critical thinking, creativity, and innovation have become critical in today's increasingly interconnected workforce and society (eSchool News).
Heather Sullivan

The News Business: Out of Print: Reporting & Essays: The New Yorker - 0 views

  • Arthur Miller once described a good newspaper as “a nation talking to itself.” If only in this respect, the Huffington Post is a great newspaper. It is not unusual for a short blog post to inspire a thousand posts from readers—posts that go off in their own directions and lead to arguments and conversations unrelated to the topic that inspired them. Occasionally, these comments present original perspectives and arguments, but many resemble the graffiti on a bathroom wall.
    • Heather Sullivan
       
      "A Nation Talking to Itself...Hmmm...Sounds like the Blogosphere to me...
  • Democratic theory demands that citizens be knowledgeable about issues and familiar with the individuals put forward to lead them. And, while these assumptions may have been reasonable for the white, male, property-owning classes of James Franklin’s Colonial Boston, contemporary capitalist society had, in Lippmann’s view, grown too big and complex for crucial events to be mastered by the average citizen.
  • Lippmann likened the average American—or “outsider,” as he tellingly named him—to a “deaf spectator in the back row” at a sporting event: “He does not know what is happening, why it is happening, what ought to happen,” and “he lives in a world which he cannot see, does not understand and is unable to direct.” In a description that may strike a familiar chord with anyone who watches cable news or listens to talk radio today, Lippmann assumed a public that “is slow to be aroused and quickly diverted . . . and is interested only when events have been melodramatized as a conflict.” A committed élitist, Lippmann did not see why anyone should find these conclusions shocking. Average citizens are hardly expected to master particle physics or post-structuralism. Why should we expect them to understand the politics of Congress, much less that of the Middle East?
  • ...14 more annotations...
  • Dewey also criticized Lippmann’s trust in knowledge-based élites. “A class of experts is inevitably so removed from common interests as to become a class with private interests and private knowledge,” he argued.
  • The history of the American press demonstrates a tendency toward exactly the kind of professionalization for which Lippmann initially argued.
  • The Lippmann model received its initial challenge from the political right.
  • A liberal version of the Deweyan community took longer to form, in part because it took liberals longer to find fault with the media.
  • The birth of the liberal blogosphere, with its ability to bypass the big media institutions and conduct conversations within a like-minded community, represents a revival of the Deweyan challenge to our Lippmann-like understanding of what constitutes “news” and, in doing so, might seem to revive the philosopher’s notion of a genuinely democratic discourse.
  • The Web provides a powerful platform that enables the creation of communities; distribution is frictionless, swift, and cheap. The old democratic model was a nation of New England towns filled with well-meaning, well-informed yeoman farmers. Thanks to the Web, we can all join in a Deweyan debate on Presidents, policies, and proposals. All that’s necessary is a decent Internet connection.
  • In October, 2005, at an advertisers’ conference in Phoenix, Bill Keller complained that bloggers merely “recycle and chew on the news,” contrasting that with the Times’ emphas
  • “Bloggers are not chewing on the news. They are spitting it out,” Arianna Huffington protested in a Huffington Post blog.
  • n a recent episode of “The Simpsons,” a cartoon version of Dan Rather introduced a debate panel featuring “Ron Lehar, a print journalist from the Washington Post.” This inspired Bart’s nemesis Nelson to shout, “Haw haw! Your medium is dying!” “Nelson!” Principal Skinner admonished the boy. “But it is!” was the young man’s reply.
  • The survivors among the big newspapers will not be without support from the nonprofit sector.
  • And so we are about to enter a fractured, chaotic world of news, characterized by superior community conversation but a decidedly diminished level of first-rate journalism. The transformation of newspapers from enterprises devoted to objective reporting to a cluster of communities, each engaged in its own kind of “news”––and each with its own set of “truths” upon which to base debate and discussion––will mean the loss of a single national narrative and agreed-upon set of “facts” by which to conduct our politics. News will become increasingly “red” or “blue.” This is not utterly new. Before Adolph Ochs took over the Times, in 1896, and issued his famous “without fear or favor” declaration, the American scene was dominated by brazenly partisan newspapers. And the news cultures of many European nations long ago embraced the notion of competing narratives for different political communities, with individual newspapers reflecting the views of each faction. It may not be entirely coincidental that these nations enjoy a level of political engagement that dwarfs that of the United States.
  • he transformation will also engender serious losses. By providing what Bill Keller, of the Times, calls the “serendipitous encounters that are hard to replicate in the quicker, reader-driven format of a Web site”—a difference that he compares to that “between a clock and a calendar”—newspapers have helped to define the meaning of America to its citizens.
  • Just how an Internet-based news culture can spread the kind of “light” that is necessary to prevent terrible things, without the armies of reporters and photographers that newspapers have traditionally employed, is a question that even the most ardent democrat in John Dewey’s tradition may not wish to see answered. ♦
  • Finally, we need to consider what will become of those people, both at home and abroad, who depend on such journalistic enterprises to keep them safe from various forms of torture, oppression, and injustice.
Fred Delventhal

Exploratorium | Evidence | How Do We Know What We Know? | Human Origins - 0 views

  • Science is an active process of observation and investigation. Evidence: How Do We Know What We Know? examines that process, revealing the ways in which ideas and information become knowledge and understanding.
  •  
    Science is an active process of observation and investigation. Evidence: How Do We Know What We Know? examines that process, revealing the ways in which ideas and information become knowledge and understanding.
Certificate IV Assessment

Qualified Trainers with Certificate IV in Training and Assessment - 1 views

With a talent for helping others and teaching, becoming a trainer is the perfect career progression for me. To train myself and become recognised in my chosen field, I enrolled to get a Certificate...

education

started by Certificate IV Assessment on 25 Aug 11 no follow-up yet
Stacey Lang

Qualified Trainers with Certificate IV in Training and Assessment - 1 views

With a talent for helping others and teaching, becoming a trainer is the perfect career progression for me. To train myself and become recognised in my chosen field, I enrolled to get a Certificate...

Certificate IV in Training and Assessment

started by Stacey Lang on 27 Sep 11 no follow-up yet
Certificate IV Assessment

Qualified Trainers with Certificate IV in Training and Assessment - 1 views

With a talent for helping others and teaching, becoming a trainer is the perfect career progression for me. To train myself and become recognised in my chosen field, I enrolled to get a Certificat...

Certificate IV in Training and Assessment

started by Certificate IV Assessment on 26 Sep 11 no follow-up yet
learnnovators

Six Obstacles To Building Communities In Organizations - 5 views

  •  
    The role of a Community Manager is becoming well-established with communities being perceived as platforms that have the potential to reduce the cost of communication, bridge organizational silos, facilitate cross-team conversations thus creating opportunities for innovation, knowledge transfer, expertise location, and more.
  •  
    The role of a Community Manager is becoming well-established with communities being perceived as platforms that have the potential to reduce the cost of communication, bridge organizational silos, facilitate cross-team conversations thus creating opportunities for innovation, knowledge transfer, expertise location, and more.
Floyd Sutton

Types of Content Theft - 2 views

  •  
    BT newbies can ought to actively value more highly to amendment the settings. The company is additionally introducing new BT Parental Controls that transcend the remit of its current free privacy controls, that solely specialize in desktops and laptops. The new controls can cowl all internet-connected devices within the home, together with tablets, game consoles, and smartphones. New customers, says BT in a very promulgation, "[will] ought to build a alternative on whether or not or to not activate the parental controls once putting in place their web affiliation for the primary time," adding that "the possibility of getting the controls enforced is pre-selected." you will either ought to make sure that you are pleased with the pre-selected protection level, or actively value more highly to amendment the settings, that BT is keen to cue you would possibly expose you to "content doubtless unsuitable for kids." "BT takes the difficulty of on-line kid protection extraordinarily seriously, and that we area unit very happy to be able to launch the whole-home filter to assist folks keep their families safe on-line. It adds to the numerous tools we have a tendency to already build accessible for gratis to our customers. We've been targeted on the difficulty of on-line safety since we have a tendency to developed the globe's 1st Cleanfeed filter to dam ill-usage pictures and created the technology accessible liberated to different ISPs across the world a decade past," says Pete Oliver, MD of client industrial selling and digital at BT.
  • ...2 more comments...
  •  
    Coleaks SMS Bomber New 2013: New 2013.... New
  •  
    PRO FACEBOOK HACKS Hello My Friends! If you are currently on this site it is because you are looking for a way to hack the password of a facebook account. You've probably lost a lot of time looking at other sites for the best way to hack a facebook account, but unfortunately, it did not really help you. To save you even more time, all you can find on other sites as solutions are phishing, keyloggers, social engineering and hacking of the email address of facebook account (if known), these methods work, but not for everyone and are very difficult to implement. The common reasons that make you want to hack a facebook are the following: Cheating partner suspicion Recovery of a lost/hacked password Monitoring of children activity Revenge on someone Simple curiosity Well, let us congratulate you because you just found the right place! Our site dosen't put you to download thousand of tools for a lot of money. Our website is an ON-LINE tool and you have just to enter the victim FB URL, and it will return you the victim password. So... What we waiting for...?
  •  
    As Gen. Alexander prepares to retire, Obama administration seeks one replacement. The White House has some big positions to fill in the Defense Department and at the National Security Agency (NSA) this coming spring. But as The Washington Post reports, they'll be looking for just a single person to fill them all. Since the creation of the US Cyber Command (USCYBERCOM), the Department of Defense's joint command in charge of operating and defending the military's network, one man has been at the helm: US Army General Keith Alexander. Alexander is also Director of the National Security Agency and the Chief of Central Security Service. Those combined roles have put responsibility for a huge swath of the US military's "network warfare" under a single man's purview-a concentration of power that has caused a great deal of concern. In fact, the Director of the Office of National Intelligence and the panel appointed by President Obama to review the operations of the NSA have both recommended that the NSA and the DOD's Cyber Command be put under separate leadership. The review panel, appointed in the wake of leaks from former NSA contractor Edward Snowden, submitted a draft recommendation to President Barack Obama recommending that a civilian should be appointed head of the NSA, while Cyber Command should remain under military leadership. But the Obama administration has ignored that advice, announcing that it will continue the arrangement that let Alexander command most of the nation's military and civilian offensive and defensive cyber capabilities. "Following an interagency review," White House spokeswoman Caitlyn Hayden wrote in an email to the Post, "the administration has decided that keeping the positions of NSA Director and Cyber Command Commander together as one, dual-hatted position is the most effective approach to accomplish both agencies' missions." The NSA has been under a military commander since its inception. But General Alexander is the highest-ranking mi
  •  
    Types of Content Theft CAMCORDER THEFT Approximately ninety percent of newly released movies that are pirated can be traced to thieves who use a digital recording device in a movie theater to literally steal the image and/or sound off the screen. Camcorder theft is one of the biggest problems facing the film industry. All it takes is one camcorder copy to trigger the mass reproduction and distribution of millions of illegal Internet downloads and bootlegs in global street markets just hours after a film's release and well before it becomes available for legal rental or purchase from legitimate suppliers. Studios and theater owners have significantly increased security and surveillance in theaters all over the world to thwart would-be camcorders. Since 2003, the major motion picture studios have employed technology such as watermarking films, which enables film companies to discern the source of a stolen film through forensic analysis and trace it back to the very theater in which it was recorded. PEER-TO-PEER (P2P) THEFT A peer-to-peer (P2P) network is a system that enables Internet users through the exchange of digital files among individual computers or "peers" to (1) make files (including movies and music) stored on their computer available for copying by other users; (2) search for files stored on other users' computers; and (3) transfer exact copies of files from one computer to another. P2P technology itself is not illegal and may be useful for many legal purposes, but people often use the technology to illegally exchange copyrighted material on the Internet. While people may believe their files are being exchanged among only a few "friends," these files can be accessed by millions of people around the world who are part of the same P2P network. If you download movies using illegal peer-to-peer sites, you are often also distributing illegal content, as the default setting of most P2P networks ensures that individuals downloading files from the network ar
bengalic

How to Complete the Most of Online Shopping in Bangladesh? - 2 views

The evolution of the internet has completely transformed the traditional shopping experience. People can now find products worldwide and shop instantly, with payments made within seconds. They also...

online retail grocery e-commerce

started by bengalic on 16 Apr 22 no follow-up yet
nathanielcowan54

Buy YouTube Accounts - Best Social Service Provider - 0 views

  •  
    Buy YouTube Accounts Introduction You understand as a business owner how effective a marketing tool YouTube can be. You are also aware of how challenging it may be to start using YouTube without an account. There are a few things to consider if you're considering about purchasing a YouTube account for your company. To begin with, purchasing a YouTube account is distinct from purchasing a Gmail or domain name. As Google+ accounts and YouTube accounts are linked, you must also set up a Google+ account for your company. Visit Google.com/business to accomplish this. Why Your Company Should Own a YouTube Account? As a business owner, you are aware of how crucial marketing is to the success of your enterprise. You are also aware that one of the most effective marketing strategies now in use is social media. So why not promote your company on YouTube? With over 1 billion subscribers, YouTube is the second most popular search engine after Google. That implies that YouTube has a sizable potential customer base for your company. Buy YouTube Accounts How to Get a YouTube Account? A few things should be taken into account before buying a YouTube account for your company. Choosing a personal or business account is the first step. A business account would be more appropriate if you intend to use YouTube for marketing purposes. You will then have access to features like personalized branding, sophisticated analytics, and business-specific tools. Price is another factor to take into account. The number of subscribers, the caliber of the content, and the quantity of views are some of the variables that will impact the cost of a YouTube account. Choose a less expensive account if you are on a tight budget. However, remember that the standard the account is more significant than the cost. How to Create a YouTube Account? You must create a YouTube account for your company in order to begin using YouTube marketing. This account, which is made exclusively for your business, will
anonymous

How Cloud Storage Can Help You To Share And Store Your Music Files Effectively - 0 views

  •  
    Cloud storage has become the most preferred means of delivering information to different locations and it focuses primarily on providing consumers with a wide range of functionalities that includes networking, e-shopping, entertainment and protecting important digital documents and other.
1 - 20 of 179 Next › Last »
Showing 20 items per page