Skip to main content

Home/ educators/ Group items tagged Robert

Rss Feed Group items tagged

Claude Almansi

"LE MUR, La psychanalyse à l'épreuve de l'autisme - Partie 1" | Universal Sub... - 1 views

  •  
    Documentaire de Sophie Robert "Une longue enquête réalisée auprès d'une trentaine de pédopsychiatres-psychanalystes, dont quelques-uns parmi les plus grands spécialistes français de l'autisme, afin de démontrer par l'absurde - de la bouche même des psychanalystes - de l'inefficacité de la prise en charge psychanalytique de l'autisme."
valerie taylor

The Black Boxes of Science and Engineering - YouTube - 10 views

  •  
    "Dr. Robert Lindberg, President and Executive Director of the National Institute of Aerospace, envisions a new way to introduce Engineering into the K-12 curriculum by exploring the distinctions between Science and Engineering; between the Natural World and the Designed World; and between the Scientific Method and the Engineering Design Process."
Vicki Davis

Gamifi-EDOOC - home - 10 views

  •  
    Verena Roberts is organizing and open online community around research based gamification in education. We're using this as a resource for the Gamifi-ED project K12 and college students and for anyone who is teaching gamification in education as these resources will be open.
Vicki Davis

Researchers say tooth proves T. rex was predator - CNN.com - 1 views

  •  
    More science news! A duckbill dinosaur was found with a trex tooth in it. Yes - Trex was a predator, so no rewrite of Jurassic park is needed. "You see 'Jurassic Park,' and you see T. rex as this massive hunter and killer, as incredibly vicious. But scientists have argued for 100 years that he was too big and too slow to hunt prey and that he was probably a scavenger, an animal that feeds only on dead things," University of Kansas paleontologist David Burnham said. Burnham and researcher Robert DePalma got what Burnham described as his "lucky break" when they found the fossil of a duckbill dinosaur's tail with a tooth in it."
Vicki Davis

Docs Voice Comments - YouTube - 9 views

  •  
    Jen Roberts gives tips on how to add voice comments to Google Docs. If you're writing in Google Docs, this is a great technique as voice always gives you a closer connection, particularly for struggling readers. They can also hear your voice and know the intent of your words.
Sandy Kendell

Fighting With Teenagers: A Copyright Story - 17 views

  •  
    Musical composer Jason Robert Brown debates copyright of sheet-music with a teenager. Follow their email conversation for excellent insight into the copyright dilemma. Great real-life scenario to use if discussing copyright with teachers and/or students.
Vicki Davis

Young Epidemiology Scholars Competition - 1 views

  •  
    Guidance Counselor Alert: "The YES Competition was established in 2003 by the Robert Wood Johnson Foundation and the College Board to inspire talented high school students to apply epidemiological methods to the investigation of public health issues and, ultimately, encourage the brightest young minds to enter the field of public health. The Young Epidemiology Scholars (YES) Competition, the nation's leading public health competition for high school students, has opened the application process for its 2010-11 Competition. The online registration, guidelines and a new YES project guide are now available online at www.collegeboard.com/yes. The deadline for entries is 9 AM EST, February 1, 2011." I do wish that they would have multimedia as a part of this competition as some of the best competitions out there engage this medium. However, this is something that those going into health should look into.
Fred Delventhal

The generation raised on the internet | The kids are alright | The Economist - 0 views

  •  
    WORRIES about the damage the internet may be doing to young people has produced a mountain of books-a suitably old technology in which to express concerns about the new. Robert Bly claims that, thanks to the internet, the "neo-cortex is finally eating itself". Today's youth may be web-savvy, but they also stand accused of being unread, bad at communicating, socially inept, shameless, dishonest, work-shy, narcissistic and indifferent to the needs of others.
Jocelyn Chappell

Post election feedback | Aylesbury LIFE - 0 views

  •  
    BWO Twitter: htjoshua @downingstreet what chance PM invites pupils 2write2 Mugabe on behalf of persecuted teachers who ran poll stations returning "wrong" results
  •  
    In the light of post election persecution of teachers who ran poll stations returning the "wrong" results in Zimbabwe's recent elections, I have just asked our Prime Minister if he is going to invite pupils worldwide to write to Robert Mugabe expressing concern for: * teachers in fear of their lives, * pupils who miss learning, and * exams that cannot be run even. It happens the form of the question was by way of Twitter:
Anne Bubnic

Ed tech leads to significant gains - 0 views

  •  
    If you attended CUE 09 this year and the keynote by Robert Marzano, you'll recognize this article as an encapsulation of his research on the use of Promethean smartboards.
Vicki Davis

The Kids Are Ready | Classroom Applications - 7 views

  •  
    Nice write up on how Brad Flickinger is running his elementary classroom with a lot of high-quality technology equipment where the students serve as mentors for each other. Love this model. Hat tip: Robert Madden
Martin Burrett

Early intervention is better for children overcoming reading difficulties - 0 views

  •  
    "A University of Alberta education researcher who achieved dramatic results with early assessment and intervention to help Grade 1 and 2 students with reading difficulties says there's still a chance to help these students in Grade 3. George Georgiou, a professor in the Department of Educational Psychology, along with his collaborators Rauno Parrila at Macquarie University and Robert Savage from the University College of London, started working with 290 Grade 1 students from 11 Edmonton public schools in 2015-16."
Martin Burrett

Book: Uncharted Territories by @Hywel_Roberts & @DebraKidd - 0 views

  •  
    "In their new book, Debra Kidd and Hywel Roberts firmly place teachers, and ultimately their students, in a range of different locations, where the learning inhabits, offering a fantastically imagined context with prompts, ideas and illustrations helping exploration and discovery. In a fascinating resource book, which can be used in many subject areas, across most stages in schools, the authors break down each chapter destination (including a forest, castle, graveyard, ship, zoo, cave, theme park) into a story starter - introducing the location and providing provocative initial questions; key landmarks (either for primary or secondary aged students), a stopover - providing a more in-depth account of their learning journey; stepping stones - context based tasks provided to also prod your imagination, and; the bedrock - offering a debrief of the processes, helping teachers understand the justification of the processes undertaken."
Ed Webb

Mind - Research Upends Traditional Thinking on Study Habits - NYTimes.com - 3 views

  • instead of sticking to one study location, simply alternating the room where a person studies improves retention. So does studying distinct but related skills or concepts in one sitting, rather than focusing intensely on a single thing. “We have known these principles for some time, and it’s intriguing that schools don’t pick them up, or that people don’t learn them by trial and error,” said Robert A. Bjork, a psychologist at the University of California, Los Angeles. “Instead, we walk around with all sorts of unexamined beliefs about what works that are mistaken.”
  • The brain makes subtle associations between what it is studying and the background sensations it has at the time, the authors say, regardless of whether those perceptions are conscious. It colors the terms of the Versailles Treaty with the wasted fluorescent glow of the dorm study room, say; or the elements of the Marshall Plan with the jade-curtain shade of the willow tree in the backyard. Forcing the brain to make multiple associations with the same material may, in effect, give that information more neural scaffolding.
  • Cognitive scientists do not deny that honest-to-goodness cramming can lead to a better grade on a given exam. But hurriedly jam-packing a brain is akin to speed-packing a cheap suitcase, as most students quickly learn — it holds its new load for a while, then most everything falls out. “With many students, it’s not like they can’t remember the material” when they move to a more advanced class, said Henry L. Roediger III, a psychologist at Washington University in St. Louis. “It’s like they’ve never seen it before.”
  • ...6 more annotations...
  • cognitive scientists see testing itself — or practice tests and quizzes — as a powerful tool of learning, rather than merely assessment. The process of retrieving an idea is not like pulling a book from a shelf; it seems to fundamentally alter the way the information is subsequently stored, making it far more accessible in the future.
  • “The idea is that forgetting is the friend of learning,” said Dr. Kornell. “When you forget something, it allows you to relearn, and do so effectively, the next time you see it.”
  • An hour of study tonight, an hour on the weekend, another session a week from now: such so-called spacing improves later recall, without requiring students to put in more overall study effort or pay more attention, dozens of studies have found.
  • “Testing not only measures knowledge but changes it,” he says — and, happily, in the direction of more certainty, not less.
  • “Testing has such bad connotation; people think of standardized testing or teaching to the test,” Dr. Roediger said. “Maybe we need to call it something else, but this is one of the most powerful learning tools we have.”
  • The harder it is to remember something, the harder it is to later forget. This effect, which researchers call “desirable difficulty,”
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Tony Searl

down the avenue: Redefining Digital Inclusion - 0 views

  • We have to figure out a way to embrace and value informal learning, such as self-study.
    • Tony Searl
       
      future PD must also address this
  • Robert Scoble asserts that the change will come from the kids, not from top down.
    • Tony Searl
       
      no brainer RS, it is already. control is the real fear of these changes
1 - 20 of 21 Next ›
Showing 20 items per page