Skip to main content

Home/ EdTechTalk/ Group items tagged end

Rss Feed Group items tagged

anonymous

Schoolwide Enrichment Model (SEM) - 0 views

  •  
    The Schoolwide Enrichment Model (SEM) (Renzulli, 1977; Renzulli & Reis, 1985, 1997) is widely implemented as an enrichment program used with academically gifted and talented students and a magnet theme/enrichment approach for all schools interested in high-end learning and developing the strengths and talents of all students. The major goal of the SEM is the application of gifted education pedagogy to total school improvement. The SEM provides enriched learning experiences and higher learning standards for all children through three goals; developing talents in all children, providing a broad range of advanced-level enrichment experiences for all students, and providing advanced follow-up opportunities for young people based on their strengths and interests. The SEM focuses on enrichment for all students through high levels of engagement and the use of enjoyable and challenging learning experiences that are constructed around students' interests, learning styles, and preferred modes of expression.
  •  
    Save Bookmark
Dave Truss

Dollars and Sense: Kids Invest in Funds -- and Their Own Future | Edutopia - 0 views

  •  
    Video: Class is given $20,000 to invest stating in Grade 6 and ending in Grade 8, profits to charity... real life entrepreneur skills are taught!
Patrick Black

animoto - the end of slideshows - 0 views

  •  
    Makes funky videos (slideshows) from images and music
edtechtalk

only the databases paid for by the district or Web sites ending in "edu" or &... - 0 views

  •  
    Hallo guys. I am very happy to share here. This is my site. If you would like to visit here. Go ahead. I've made ​​About a $ 58,000 from my little site. There is a forum and I was very happy to announce to you. I also provide seo service. www.killdo.de.gg www.gratisdatingsite.nl/ gratis datingsite datingsites www.nr1gratisdating.nl/‎ gratis datingsite gratis dating
J Black

The End in Mind » A Post-LMS Manifesto - 0 views

  • Technology has and always will be an integral part of what we do to help our students “become.” But helping someone improve, to become a better, more skilled, more knowledgeable, more confident person is not fundamentally a technology problem. It’s a people problem. Or rather, it’s a people opportunity.
  • The problem with one-to-one instruction is that is simply doesn’t scale. Historically, there simply haven’t been enough tutors to go around if our goal is to educate the masses, to help every learner “become.”
  • Through experimental investigation, Bloom found that “the average student under tutoring was about two standard deviations above the average” of students who studied in a traditional classroom setting with 30 other students
  • ...11 more annotations...
    • J Black
       
      I agree - for example, blogging within a LMS does not allow this, whereas blogging with a known host (Blogger, WP) does help students to connect with others inside and outside of the learning environment/institution.
    • J Black
       
      This is a very profound statement that we should closely look at. Do LMS do nothing more than perpetuate the traditional classroom model?
  • here is, at its very core, a problem with the LMS paradigm. The “M” in “LMS” stands for “management.” This is not insignificant. The word heavily implies that the provider of the LMS, the educational institution, is “managing” student learning. Since the dawn of public education and the praiseworthy societal undertaking “educate the masses,” management has become an integral part of the learning. And this is exactly what we have designed and used LMSs to do—to manage the flow of students through traditional, semester-based courses more efficiently than ever before. The LMS has done exactly what we hired it to do: it has reinforced, facilitated, and perpetuated the traditional classroom model, the same model that Bloom found woefully less effective than one-on-one learning.
  • We can extend, expand, enhance, magnify, and amplify the reach and effectiveness of human interaction with technology and communication tools, but the underlying reality is that real people must converse with each other in the process of “becoming.”
  • Because the LMS is primarily a traditional classroom support tool, it is ill-suited to bridge the 2-sigma gap between classroom instruction and personal tutoring.
  • undamentally human endeavor that requires personal interaction and communication, person to person.
  • n the post-LMS world, we need to worry less about “managing” learners and focus more on helping them connect with other like-minded learners both inside and outside of our institutions.
  • We need to foster in them greater personal accountability, responsibility and autonomy in their pursuit of learning in the broader community of learners. We need to use the communication tools available to us today and the tools that will be invented tomorrow to enable anytime, anywhere, any-scale learning conversations between our students and other learners
  • However, instead of that tutor appearing in the form of an individual human being or in the form of a virtual AI tutor, the tutor will be the crowd.
  • The paradigm—not the technology—is the problem.
  • Building a better, more feature-rich LMS won’t close the 2-sigma gap. We need to utilize technology to better connect people, content, and learning communities to facilitate authentic, personal, individualized learning. What are we waiting for?
    • J Black
       
      Bingo
  •  
    A very insightful look into LMS use and student achievment. Highly recommended read for users of BB or Moodle.
Henry Thiele

The End of Techno-Critique: The Naked Truth about 1:1 Laptop Initiatives and Educationa... - 18 views

  •  
    This article responds to a generation of techno-criticism in education. It contains a review of the key themes of that criticism. The context of previous efforts to reform education reframes that criticism. Within that context, the question is raised about what schools need to look and be like in order to take advantage of laptop computers and other technology. In doing so, the article presents a vision for self-organizing schools.
shalani mujer

24/7 Tech Support - 1 views

I am a script writer in a particular morning TV show. I have experience on time that, the production team asked me to submit two sets of scripts ahead for the hosts convenience. I ended up making o...

tech support

started by shalani mujer on 08 Sep 11 no follow-up yet
Reynold Redekopp

Robert Putnam - Bowling Alone - Journal of Democracy 6:1 - 5 views

  • ocial scientists in several fields have recently suggested a common framework for understanding these phenomena, a framework that rests on the concept of social capital. 4 By analogy with notions of physical capital and human capital--tools and training that enhance individual productivity--"social capital" refers to features of social organization such as networks, norms, and social trust that facilitate coordination and cooperation for mutual benefit.
  • Whether or not bowling beats balloting in the eyes of most Americans, bowling teams illustrate yet another vanishing form of social capital.
  • the most fundamental form of social capital is the family, and the massive evidence of the loosening of bonds within the family (both extended and nuclear) is well known.
  • ...4 more annotations...
  • Across the 35 countries in this survey, social trust and civic engagement are strongly correlated; the greater the density of associational membership in a society, the more trusting its citizens. Trust and engagement are two facets of the same underlying factor--social capital.[End Page 73] America still ranks relatively high by cross-national standards on both these dimensions of social capital. Even in the 1990s, after several decades' erosion, Americans are more trusting and more engaged than people in most other countries of the world. The trends of the past quarter-century, however, have apparently moved the United States significantly lower in the international rankings of social capital. The recent deterioration in American social capital has been sufficiently great that (if no other country changed its position in the meantime) another quarter-century of change at the same rate would bring the United States, roughly speaking, to the midpoint among all these countries, roughly equivalent to South Korea, Belgium, or Estonia today. Two generations' decline at the same rate would leave the United States at the level of today's Chile, Portugal, and Slovenia.
  • Other demographic transformations. A range of additional changes have transformed the American family since the 1960s--fewer marriages, more divorces, fewer children, lower real wages, and so on. Each of these changes might account for some of the slackening of civic engagement, since married, middle-class parents are generally more socially involved than other people. Moreover, the changes in scale that have swept over the American economy in these years--illustrated by the replacement of the corner grocery by the supermarket and now perhaps of the supermarket by electronic shopping at home, or the replacement of community-based enterprises by outposts of distant multinational firms--may perhaps have undermined the material and even physical basis for civic engagement.
  • The technological transformation of leisure. There is reason to believe that deep-seated technological trends are radically "privatizing" or "individualizing" our use of leisure time and thus disrupting many opportunities for social-capital formation. The most obvious and probably the most powerful instrument of this revolution is television. Time-budget studies in the 1960s showed that the growth in time spent watching television dwarfed all other changes in the way Americans passed their days and nights. Television has made our communities (or, rather, what we experience as our communities) wider and shallower. In the language of economics, electronic technology enables individual tastes to be satisfied more fully, but at the cost of the positive social externalities associated with more primitive forms of entertainment. The same logic applies to the replacement of vaudeville by the movies and now of movies by the VCR. The new "virtual reality" helmets that we will soon don to be entertained in total isolation are merely the latest extension of this trend. Is technology thus driving a wedge between our individual interests and our collective interests? It is a question that seems worth exploring more systematically.
  • who stress that closely knit social, economic, and political organizations are prone to inefficient cartelization and to what political economists term "rent seeking" and ordinary men and women call corruption.
  •  
    An article about the loss of social capital in America
seth kutcher

Excellent Computer Repair Service - 1 views

My work relies heavily on computer. That is why I cannot afford to delay my report just because I am having computer problems. I bought this computer unit 5 years ago and maybe because it is alread...

computer repair

started by seth kutcher on 02 Nov 11 no follow-up yet
techmigi

Best Dating Apps In India You Can Join If You Are Single - Techmigi - 0 views

  •  
    You are single, you remain single for the whole year but it's only Valentine day that hit you and realizes you that you are alone and single so don't worry here is a solution for you all the best dating apps in India. It's not the Nineteens where you have to follow a person and have to know a girl before you approach her you can use a mobile dating app and finds a perfect match for you. If you are single or mingle or want to have some fun Dating apps is the perfect option for you to give it a try. Finding the Best person is not so difficult in these days you can just visit these apps that I am going to list in the list of Best dating apps in India. We have conducted a survey and dig most of the user reviews to find the best dating apps in India. We have Our Special guest with us to Help us to determine which one can more useful for you, Result is at the end of the post.
Floyd Sutton

Types of Content Theft - 2 views

  •  
    BT newbies can ought to actively value more highly to amendment the settings. The company is additionally introducing new BT Parental Controls that transcend the remit of its current free privacy controls, that solely specialize in desktops and laptops. The new controls can cowl all internet-connected devices within the home, together with tablets, game consoles, and smartphones. New customers, says BT in a very promulgation, "[will] ought to build a alternative on whether or not or to not activate the parental controls once putting in place their web affiliation for the primary time," adding that "the possibility of getting the controls enforced is pre-selected." you will either ought to make sure that you are pleased with the pre-selected protection level, or actively value more highly to amendment the settings, that BT is keen to cue you would possibly expose you to "content doubtless unsuitable for kids." "BT takes the difficulty of on-line kid protection extraordinarily seriously, and that we area unit very happy to be able to launch the whole-home filter to assist folks keep their families safe on-line. It adds to the numerous tools we have a tendency to already build accessible for gratis to our customers. We've been targeted on the difficulty of on-line safety since we have a tendency to developed the globe's 1st Cleanfeed filter to dam ill-usage pictures and created the technology accessible liberated to different ISPs across the world a decade past," says Pete Oliver, MD of client industrial selling and digital at BT.
  • ...2 more comments...
  •  
    Coleaks SMS Bomber New 2013: New 2013.... New
  •  
    PRO FACEBOOK HACKS Hello My Friends! If you are currently on this site it is because you are looking for a way to hack the password of a facebook account. You've probably lost a lot of time looking at other sites for the best way to hack a facebook account, but unfortunately, it did not really help you. To save you even more time, all you can find on other sites as solutions are phishing, keyloggers, social engineering and hacking of the email address of facebook account (if known), these methods work, but not for everyone and are very difficult to implement. The common reasons that make you want to hack a facebook are the following: Cheating partner suspicion Recovery of a lost/hacked password Monitoring of children activity Revenge on someone Simple curiosity Well, let us congratulate you because you just found the right place! Our site dosen't put you to download thousand of tools for a lot of money. Our website is an ON-LINE tool and you have just to enter the victim FB URL, and it will return you the victim password. So... What we waiting for...?
  •  
    As Gen. Alexander prepares to retire, Obama administration seeks one replacement. The White House has some big positions to fill in the Defense Department and at the National Security Agency (NSA) this coming spring. But as The Washington Post reports, they'll be looking for just a single person to fill them all. Since the creation of the US Cyber Command (USCYBERCOM), the Department of Defense's joint command in charge of operating and defending the military's network, one man has been at the helm: US Army General Keith Alexander. Alexander is also Director of the National Security Agency and the Chief of Central Security Service. Those combined roles have put responsibility for a huge swath of the US military's "network warfare" under a single man's purview-a concentration of power that has caused a great deal of concern. In fact, the Director of the Office of National Intelligence and the panel appointed by President Obama to review the operations of the NSA have both recommended that the NSA and the DOD's Cyber Command be put under separate leadership. The review panel, appointed in the wake of leaks from former NSA contractor Edward Snowden, submitted a draft recommendation to President Barack Obama recommending that a civilian should be appointed head of the NSA, while Cyber Command should remain under military leadership. But the Obama administration has ignored that advice, announcing that it will continue the arrangement that let Alexander command most of the nation's military and civilian offensive and defensive cyber capabilities. "Following an interagency review," White House spokeswoman Caitlyn Hayden wrote in an email to the Post, "the administration has decided that keeping the positions of NSA Director and Cyber Command Commander together as one, dual-hatted position is the most effective approach to accomplish both agencies' missions." The NSA has been under a military commander since its inception. But General Alexander is the highest-ranking mi
  •  
    Types of Content Theft CAMCORDER THEFT Approximately ninety percent of newly released movies that are pirated can be traced to thieves who use a digital recording device in a movie theater to literally steal the image and/or sound off the screen. Camcorder theft is one of the biggest problems facing the film industry. All it takes is one camcorder copy to trigger the mass reproduction and distribution of millions of illegal Internet downloads and bootlegs in global street markets just hours after a film's release and well before it becomes available for legal rental or purchase from legitimate suppliers. Studios and theater owners have significantly increased security and surveillance in theaters all over the world to thwart would-be camcorders. Since 2003, the major motion picture studios have employed technology such as watermarking films, which enables film companies to discern the source of a stolen film through forensic analysis and trace it back to the very theater in which it was recorded. PEER-TO-PEER (P2P) THEFT A peer-to-peer (P2P) network is a system that enables Internet users through the exchange of digital files among individual computers or "peers" to (1) make files (including movies and music) stored on their computer available for copying by other users; (2) search for files stored on other users' computers; and (3) transfer exact copies of files from one computer to another. P2P technology itself is not illegal and may be useful for many legal purposes, but people often use the technology to illegally exchange copyrighted material on the Internet. While people may believe their files are being exchanged among only a few "friends," these files can be accessed by millions of people around the world who are part of the same P2P network. If you download movies using illegal peer-to-peer sites, you are often also distributing illegal content, as the default setting of most P2P networks ensures that individuals downloading files from the network ar
numberforhelp

Asiana Airlines Reservations | Manage online Booking - 0 views

  •  
    Manage your Asiana Airlines booking with the new one NUMBERFORHELP.COM USA based company that provides the Asiana Airlines Customer Service for the USA Clients Asiana.
shwetagupte1

Find A Great Respite In The Sea Of Erotic Pleasure With Chennai Escorts - 1 views

  •  
    With life full of challenges and ever-increasing material needs, people are burning late night oil to meet most of their ends. But somewhere in the life, they are losing something the most valuable: peace of mind and a quality time with friends and family.
mikejohnarizona

How To Become The Perfect Landlord? - 0 views

Treating your tenants well and getting along with them can help you to increase profitability and avoid unpleasant surprises in the future. We present to you the ten points that a good landlord mus...

Diigo

started by mikejohnarizona on 14 Jul 20 no follow-up yet
yuvi987

DevOps Online Training - 1 views

Learning During Workshop-DevOps Online Training WorkshopLearning During Workshop The workshop is designed to help the participants get started as a DevOps practitioner. We start the workshop by di...

DevOps Online Training Education technology learning Tools

started by yuvi987 on 29 Jul 20 no follow-up yet
rsg2023

different types of glass containers - 1 views

  •  
    Our brand, service, quality, and glass bottles have been widely accepted by various industries all over the world. You can use our glass bottles to pack spirits, wine, syrup, fruit juices, chili sauce, etc. Whether you are a middleman or an end-user, we can meet your needs.
« First ‹ Previous 61 - 80 of 85 Next ›
Showing 20 items per page