Skip to main content

Home/ educators/ Group items tagged US

Rss Feed Group items tagged

Jennifer Garcia

Record by phone with Gabcast.com - 7 views

  •  
    "# record using your phone or VoIP Recording audio has never been easier! Simply call us using a touch-tone telephone or a VoIP client. No microphone or audio editing software required. VoIP recording is FREE! Telephone recording is just $0.10/min - there are no other costs involved. # create podcasts Are you an audiophile? No. Then why concern yourself with the complexities of podcasting? Let us do the heavy lifting. Yes. Upload your studio produced episodes. Each of your channels can be subscribed to by an RSS client like iTunes, IE7, Firefox or any number of web-based portals. # post audio to your blogs Post audio content to your blogs! We integrate with popular blogging software like Blogger, TypePad, WordPress and more! # create audio greetings Create audio greetings to welcome users to your website! Or use a greeting as an audio avatar or signature in an email! # host conference calls Connect with colleagues and friends in conference calls! # tell me more "
Deb Henkes

50 Ways to Use Wikis for a More Collaborative and Interactive Classroom | Smart Teaching - 2 views

  • 50 Ways to Use Wikis for a More Collaborative and Interactive Classroom
  •  
    Wikis are an exceptionally useful tool for getting students more involved in curriculum. They're often appealing and fun for students to use, while at the same time ideal for encouraging participation, collaboration, and interaction. Using these ideas, your students can collaboratively create classroom valuables.
  •  
    Wikis are an exceptionally useful tool for getting students more involved in curriculum. They're often appealing and fun for students to use, while at the same time ideal for encouraging participation, collaboration, and interaction. Read to see how you can put wikis to work in your classroom.
Martin Burrett

Study finds social media has limited effects on teenage life satisfaction - 1 views

  •  
    "Researchers from the Oxford Internet Institute (OII), part of the University of Oxford, used an eight-year survey of UK households (Understanding Society, part of the UK Household Longitudinal Study) to study how long teenagers spent using social media on a normal school day and their corresponding life satisfaction ratings. This is the first large-scale and in-depth study testing not only whether adolescents who report more social media use have lower life satisfaction but also whether the reverse is true. Before this study scientists had little means of disentangling whether adolescents with lower life satisfaction use more social media or whether social media use leads to lower life satisfaction."
Martin Burrett

UKEdMag: Digital Assistants by @ICTMagic - 0 views

  •  
    "Virtual Assistants have been with us for a while and many of us have had experiences similar to the dialogue above. However, they are getting better and becoming more of an assistant than a hindrance. Apple, Google, Microsoft and Amazon all have voice activated assistance. I've used them all at different times for my personal use, especially Google Now, but Amazon's Alexa assistant is the only one I've used in the classroom via an Amazon echo. Many of the following ideas can be done on any of the above assistants, but I will focus on Amazon's Alexa."
Vicki Davis

The tags we're using - 300 views

When you click "send to group" a list of 16 tags pop up -- these are from the tag dictionary -- each time you send to the group, you should select at least 2-3 of those. It lets you do this. http:...

diigo

Ed Webb

The academy's neoliberal response to COVID-19: Why faculty should be wary and... - 1 views

  • In the neoliberal economy, workers are seen as commodities and are expected to be trained and “work-ready” before they are hired. The cost and responsibility for job-training fall predominantly on individual workers rather than on employers. This is evident in the expectation that work experience should be a condition of hiring. This is true of the academic hiring process, which no longer involves hiring those who show promise in their field and can be apprenticed on the tenure track, but rather those with the means, privilege, and grit to assemble a tenurable CV on their own dime and arrive to the tenure track work-ready.
  • The assumption that faculty are pre-trained, or able to train themselves without additional time and support, underpins university directives that faculty move classes online without investing in training to support faculty in this shift. For context, at the University of Waterloo, the normal supports for developing an online course include one to two course releases, 12-18 months of preparation time, and the help of three staff members—one of whom is an online learning consultant, and each of whom supports only about two other courses. Instead, at universities across Canada, the move online under COVID-19 is not called “online teaching” but “remote teaching”, which universities seem to think absolves them of the responsibility to give faculty sufficient technological training, pedagogical consultation, and preparation time.
  • faculty are encouraged to strip away the transformative pedagogical work that has long been part of their profession and to merely administer a course or deliver course material
  • ...19 more annotations...
  • remote teaching directives are rooted in the assumption that faculty are equally positioned to carry them out
  • The dual delivery model—in which some students in a course come to class and others work remotely using pre-recorded or other asynchronous course material—is already part of a number of university plans for the fall, even though it requires vastly more work than either in-person or remote courses alone. The failure to accommodate faculty who are not well positioned to transform their courses from in-person to remote teaching—or some combination of the two— will actively exacerbate existing inequalities, marking a step backward for equity.
  • Neoliberal democracy is characterized by competitive individualism and centres on the individual advocacy of ostensibly equal citizens through their vote with no common social or political goals. By extension, group identity and collective advocacy are delegitimized as undemocratic attempts to gain more of a say than those involved would otherwise have as individuals.
  • Portraying people as atomized individuals allows social problems to be framed as individual failures
  • faculty are increasingly encouraged to see themselves as competitors who must maintain a constant level of productivity and act as entrepreneurs to sell ideas to potential investors in the form of external funding agencies or private commercial interests. Rather than freedom of enquiry, faculty research is increasingly monitored through performance metrics. Academic governance is being replaced by corporate governance models while faculty and faculty associations are no longer being respected for the integral role they play in the governance process, but are instead considered to be a stakeholder akin to alumni associations or capital investors.
  • treats structural and pedagogical barriers as minor individual technical or administrative problems that the instructor can overcome simply by watching more Zoom webinars and practising better self-care.
  • In neoliberal thought, education is merely pursued by individuals who want to invest in skills and credentials that will increase their value in the labour market.
  • A guiding principle of neoliberal thought is that citizens should interact as formal equals, without regard for the substantive inequalities between us. This formal equality makes it difficult to articulate needs that arise from historical injustices, for instance, as marginalized groups are seen merely as stakeholders with views equally valuable to those of other stakeholders. In the neoliberal university, this notion of formal equality can be seen, among other things, in the use of standards and assessments, such as teaching evaluations, that have been shown to be biased against instructors from marginalized groups, and in the disproportionate amount of care and service work that falls to these faculty members.
  • Instead of discussing better Zoom learning techniques, we should collectively ask what teaching in the COVID-19 era would look like if universities valued education and research as essential public goods.
  • while there are still some advocates for the democratic potential of online teaching, there are strong criticisms that pedagogies rooted in well-established understandings of education as a collective, immersive, and empowering experience, through which students learn how to deliberate, collaborate, and interrogate established norms, cannot simply be transferred online
  • Humans learn through narrative, context, empathy, debate, and shared experiences. We are able to open ourselves up enough to ask difficult questions and allow ourselves to be challenged only when we are able to see the humanity in others and when our own humanity is recognized by others. This kind of active learning (as opposed to the passive reception of information) requires the trust, collectivity, and understanding of divergent experiences built through regular synchronous meetings in a shared physical space. This is hindered when classroom interaction is mediated through disembodied video images and temporally delayed chat functions.
  • When teaching is reduced to content delivery, faculty become interchangeable, which raises additional questions about academic freedom. Suggestions have already been made that the workload problem brought on by remote teaching would be mitigated if faculty simply taught existing online courses designed by others. It does not take complex modelling to imagine a new normal in which an undergraduate degree consists solely of downloading and memorizing cookie-cutter course material uploaded by people with no expertise in the area who are administering ten other courses simultaneously. 
  • when teaching is reduced to content delivery, intellectual property takes on additional importance. It is illegal to record and distribute lectures or other course material without the instructor’s permission, but universities seem reluctant to confirm that they will not have the right to use the content faculty post online. For instance, if a contract faculty member spends countless hours designing a remote course for the summer semester and then is laid off in the fall, can the university still use their recorded lectures and other material in the fall? Can the university use this recorded lecture material to continue teaching these courses if faculty are on strike (as happened in the UK in 2018)? What precedents are being set? 
  • Students’ exposure to a range of rigorous thought is also endangered, since it is much easier for students to record and distribute course content when faculty post it online. Some websites are already using the move to remote teaching as an opportunity to urge students to call out and shame faculty they deem to be “liberal” or “left” by reposting their course material. To avoid this, faculty are likely to self-censor, choosing material they feel is safer. Course material will become more generic, which will diminish the quality of students’ education.
  • In neoliberal thought, the public sphere is severely diminished, and the role of the university in the public sphere—and as a public sphere unto itself—is treated as unnecessary. The principle that enquiry and debate are public goods in and of themselves, regardless of their outcome or impact, is devalued, as is the notion that a society’s self-knowledge and self-criticism are crucial to democracy, societal improvement, and the pursuit of the good life. Expert opinion is devalued, and research is desirable only when it translates into gains for the private sector, essentially treating universities as vehicles to channel public funding into private research and development. 
  • The free and broad pursuit—and critique—of knowledge is arguably even more important in times of crisis and rapid social change.
  • Policies that advance neoliberal ideals have long been justified—and opposition to them discredited—using Margaret Thatcher’s famous line that “there is no alternative.” This notion is reproduced in universities framing their responses to COVID-19 as a fait accompli—the inevitable result of unfortunate circumstances. Yet the neoliberal assumptions that underpin these responses illustrate that choices are being made and force us to ask whether the emergency we face necessitates this exact response.
  • The notion that faculty can simply move their courses online—or teach them simultaneously online and in person—is rooted in the assumption that educating involves merely delivering information to students, which can be done just as easily online as it can be in person. There are many well-developed online courses, yet all but the most ardent enthusiasts concede that the format works better for some subjects and some students
  • Emergencies matter. Far from occasions that justify suspending our principles, the way that we handle the extra-ordinary, the unexpected, sends a message about what we truly value. While COVID-19 may seem exceptional, university responses to this crisis are hardly a departure from the neoliberal norm, and university administrations are already making plans to extend online teaching after it dissipates. We must be careful not to send the message that the neoliberal university and the worldview that underpins it are acceptable.
Duane Sharrock

Metacognition: An Overview - 7 views

  • Metacognition refers to higher order thinking which involves active control over the cognitive processes engaged in learning. Activities such as planning how to approach a given learning task, monitoring comprehension, and evaluating progress toward the completion of a task are metacognitive in nature.
  • "Metacognition" is often simply defined as "thinking about thinking."
  • While there are some distinctions between definitions (see Van Zile-Tamsen, 1994, 1996 for a full discussion), all emphasize the role of executive processes in the overseeing and regulation of cognitive processes.
  • ...14 more annotations...
  • Most definitions of metacognition include both knowledge and strategy components
  • According to Flavell (1979, 1987), metacognition consists of both metacognitive knowledge and metacognitive experiences or regulation. Metacognitive knowledge refers to acquired knowledge about cognitive processes, knowledge that can be used to control cognitive processes. Flavell further divides metacognitive knowledge into three categories: knowledge of person variables, task variables and strategy variables.
  • These processes help to regulate and oversee learning, and consist of planning and monitoring cognitive activities, as well as checking the outcomes of those activities.
  • What is the difference between a cognitive and a metacognitive strategy?
  • Cognitive strategies are used to help an individual achieve a particular goal (e.g., understanding a text) while metacognitive strategies are used to ensure that the goal has been reached (e.g., quizzing oneself to evaluate one's understanding of that text).
  • Metacognitive and cognitive strategies may overlap in that the same strategy, such as questioning, could be regarded as either a cognitive or a metacognitive strategy depending on what the purpose for using that strategy may be.
  • Metacognition, or the ability to control one's cognitive processes (self-regulation) has been linked to intelligence
  • Knowledge is considered to be metacognitive if it is actively used in a strategic manner to ensure that a goal is met.
  • Sternberg refers to these executive processes as "metacomponents" in his triarchic theory of intelligence (Sternberg, 1984, 1986a, 1986b). Metacomponents are executive processes that control other cognitive components as well as receive feedback from these components. According to Sternberg, metacomponents are responsible for "figuring out how to do a particular task or set of tasks, and then making sure that the task or set of tasks are done correctly" (Sternberg, 1986b, p. 24). These executive processes involve planning, evaluating and monitoring problem-solving activities. Sternberg maintains that the ability to appropriately allocate cognitive resources, such as deciding how and when a given task should be accomplished, is central to intelligence.
  • Cognitive Strategy Instruction
  • Cognitive Strategy Instruction
  • Those with greater metacognitive abilities tend to be more successful in their cognitive endeavors.
  • CSI) is an instructional approach which emphasizes the development of thinking skills and processes as a means to enhance learning. The objective of CSI is to enable all students to become more strategic, self-reliant, flexible, and productive in their learning endeavors (Scheid, 1993)
  • Metacognition enables students to benefit from instruction (Carr, Kurtz, Schneider, Turner & Borkowski, 1989; Van Zile-Tamsen, 1996) and influences the use and maintenance of cognitive strategies
  •  
    "According to Flavell (1979, 1987), metacognition consists of both metacognitive knowledge and metacognitive experiences or regulation. Metacognitive knowledge refers to acquired knowledge about cognitive processes, knowledge that can be used to control cognitive processes. Flavell further divides metacognitive knowledge into three categories: knowledge of person variables, task variables and strategy variables."
  •  
    Sternberg defined intelligence as mental activity central to one's life in real-world environments; individuals "succeed" in life when they use mental skills to adapt to, select, and shape external environments. Correspondingly, in the late 1990s, Sternberg changed the name of the theory to the Theory of Successful Intelligence. As per its original name, the theory comprises three types of intelligence: analytical (also referred to as componential); practical (also referred to as contextual) and creative (also referred to as experiential).
Vicki Davis

60 Ways To Use Twitter In The Classroom By Category - 12 views

  •  
    60 Ways To Use Twitter In The Classroom By Category
  •  
    There are so many ways that you can use Twitter in the classroom but even if Twitter is blocked, you'll find many ideas that you can use on Edmodo or whatever educational networking tool you're using with your students. Great read.
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
John Martin

RSS « Learning 2.0 @ SIAST - 0 views

  • This week’s discovery exercises focus on learning about RSS feeds and using Google Reader (a free online newsreader) to bring your feeds together. If there is another online reader that you are more comfortable with, or that you already use, please feel free to use it.
  •  
    This week's discovery exercises focus on learning about RSS feeds and using Google Reader (a free online newsreader) to bring your feeds together. If there is another online reader that you are more comfortable with, or that you already use, please feel free to use it.
Vicki Davis

From the Annointed Few to the Collective Many - 0 views

    • Vicki Davis
       
      How sad!
  • the Internet has morphed from a presentation medium to an interactive platform in just a few years
  • a leading web analysis site
    • Vicki Davis
       
      I find this description of Technorati almost amusing.
  • ...18 more annotations...
  • more than 50 percent of Americans aged 20-30 years old use Facebook
  • among Americans under the age of 35, social networking and user-generated content sites have overtaken TV as a primary media.
  • “Visitors to MySpace.com and Friendster.com generally skew older, with people age 25 and older comprising 68 and 71 percent of their user bases, respectively.”
  • We’re in the midst of a paradigm shift where individuals are indeed connecting “in ways and at levels that [they] haven’t done before”
  • Workplace communities
  • orkplace communities are designed to solve workplace-related challenges
  • talent management is about finding, developing, and retaining key talent within the organization
  • Ernst & Young, for instance, has a significant presence on Facebook in support of its recruiting efforts
  • Google, Home Depot, Enterprise Rent a Car, and Deloitte also are recruiting using Web 2.0 tools through YouTube videos and even alumni social networks
  • “If companies keep social networks out, they will be doing a significant disservice to their bottom lines
    • Vicki Davis
       
      Understanding networks is important to students. Knowing how to be professional and what is appropriate for different spaces is vital.
  • Between 2000 and 2020, 75 million Boomers will reach retirement age.
  • The only content service with mass adoption (greater than 50 percent) was Social Networking, and this was only among respondents under the age of 35.”
  • In addition, Millennials are the first generation to spend more hours online per week than watching TV (16.7 vs 13.6).
  • some of the characteristics of Millenials, which included a desire to work in  “[open] and flat organizations” as “part of a tribe.”
  • “heavy use of technology (messaging, collaboration, online learning) as a daily part of their work lives.”
  • robust and active communities will have an easier time recruiting talented Millennials
  • they have opportunities to meaningfully connect to their peers and supervisors.
  • A retiring Boomer who is an expert in a particular field could be an excellent community manager, blogger, or wiki contributor.
    • Vicki Davis
       
      Blogging might be the answer for retiring boomers?
  •  
    Business people and management should read this article about the transformation of business by using workplace communities. "Workplace communities are designed to solve workplace-related challenges" -- they focus on tasks. I would find it interesting to see a business REALLY use technology to change things. Having the business in a business network (OK a NING) and let people tag their posts with the business related PROBLEMS they are having and blog, video, or photograph it-- the tag cloud would tell the business IMMEDIATELY what the problems are in the company. The problem with this model is that there are few corporate executives who REALLY want to know the problems within their organizations. They don't want to be problem solvers, just opportunity creators. However, when managers open their eyes (and I'm a former General Manager myself) and see that two things give business opportunity: problem solving and innovation. And they are directly related. True innovation solves problems. Read this article and think about how you may solve problems using the networks you may now create. If you don't want everyone to know, keep it private and only allow people in your company in.
Jeff Johnson

Developing an Acceptable Use Policy - 0 views

  •  
    This site is intended to assist K-12 school districts and other K-12 entities in developing their own Acceptable Use Policy for use of the K-20 Network. Since "local control" is a major tenet of K-12 education in Washington state, it is up to each district to determine what elements they wish to include in their own policy, and if they wish to include other elements not contained in the template that has been provided. It is highly recommended that all K-12 entities using the K-20 Network should have their own board-approved Acceptable Use Policy, in addition to the basic "K-20 Conditions of Use/Acceptable Use Policy" (see link below). Since it forms the basis of ALL that we do in K-12 education, we have included the K-12 Mission [restated from the OSPI Home Page] below as a reference point, and suggest you may want to include it and/or your district's mission statement with your AUP.
Vicki Davis

Japan urges limiting kids' cell phones - 0 views

  • TOKYO (AP) - Cell-phone use has become so rampant among Japanese youngsters that the government is getting involved
  •  
    Cell phones and what the japanese government is doing about it.
  •  
    Japanese government becoming "involved" in the overuse of cell phones by japanese teenagers. This program emphasizes cell phone addiction. 1/3 of japanese 6th graders and cell phones and 2/3rds of 9th graders have them. Interestingly, one panel wants to take texting off the phones? How about using texting iN school? How about letting them define words on it instead of using a dictionary? How about letting them use it in the classroom? Seems kind of like damming up the Mississippi - it may work for a while, but eventually, the dam is going to break. Yes, this is something to talk about and discuss... internet and cell phone addiction is a real issue with many kids I talk to reporting that they literally sleep with it under their pillow. However, just getting rid of texting, I don't think that is a good idea. As with anything in human history, every tool may be used for good or bad.
Vicki Davis

Hashtags - NECC - 0 views

  •  
    Hashtag page for necc -- one of the tags that may be used.
  •  
    For those of you who don't twitter but would like to follow what twitterers are saying about NECC -- this is one of the hashtags that may be used. To make this work for you, you must be following @hashtags and then use #necc in your title -- I like it sans date, but am finding some people using #necc08 and #necc2008. I'll probably use #necc to save tweetspace.
Jeff Johnson

Ten Common Copyright Permission Myths (Copyright Clearance: Fair Use, Copyrig... - 0 views

  •  
    Although the First Amendment may appear unconditional on its face, the right to speak and write freely has never been absolute. Intellectual property rights often prevail over an author's "creative license." The main benefit of copyright, for example, is the right to exclude others from making copies of a work (or any part of it) without permission. By protecting an author's expression, copyright guarantees that authors and other creators, derive financial benefits from their work. If you intend to use someone's copyrighted work, unless the use is considered a "fair use" (which is technically a defense to copyright infringement), you must obtain that person's written permission. Under federal law, only the copyright owner or someone acting with the owner's authority, such as a publisher, can grant that permission. Without written permission, you expose yourself to legal risks. While not every unauthorized use of a copyrighted work is an infringement, whenever you include another person's words, illustrations, photographs, charts or graphs in a work you publish, you must be sensitive to the risk of infringing someone's copyright. What follows are some common copyright permission myths.
Maggie Verster

www.simplescience.net - 1 views

  •  
    The idea of SIMPLE SCIENCE is to have informative music video presentations for use in the primary school classroom. They are designed to be used as part of a lesson to reinforce learning objectives and scientific concepts and also as a useful revision tool for the SAT exams. They work particularly well on a large whiteboard but can also be viewed on the computer screen and TV.
  •  
    The idea of SIMPLE SCIENCE is to have informative music video presentations for use in the primary school classroom. They are designed to be used as part of a lesson to reinforce learning objectives and scientific concepts and also as a useful revision tool for the SAT exams. They work particularly well on a large whiteboard but can also be viewed on the computer screen and TV.
Dave Truss

What can you do with a cell phone in the classroom? - Teach42 - 13 views

  • Fact is, they aren’t going away. If anything, they’re only becoming more and more prevalent. School budgets are tight, and here we are with millions of dollars in technology that’s being paid for by the parents VOLUNTARILY… and most schools refuse to leverage it because of outdated policies and teachers that don’t want to modify their own classroom management strategies.
  • When I saw Jeremy Davis recently, he told me of an educator who uses cell phones in the classroom. In fact, this teacher requires that the cell phone be out and ON the desk. In plain site. Not hidden in a pocket or backpack. So if the student is using it, the teacher KNOWS. And if the student is using it when they shouldn’t… Well, that’s when there are consequences.
  • Sure, we can keep fighting to keep cell phones hidden or banned in schools. But it’s a battle that schools can’t win. Life progresses, things change. Like it or not, these devices are here to stay, and adoption rates are racing towards 100+%. I suggest teachers be proactive. Because there’s a tidal wave coming and you can either ride with it, or have it crash into you.
  •  
    When I saw Jeremy Davis recently, he told me of an educator who uses cell phones in the classroom. In fact, this teacher requires that the cell phone be out and ON the desk. In plain site. Not hidden in a pocket or backpack. So if the student is using it, the teacher KNOWS. And if the student is using it when they shouldn't… Well, that's when there are consequences.
Martin Burrett

RealtimeBoard - 18 views

  •  
    This is an amazing collaborative whiteboard where multiple users can edit a multimedia board in real time. The site allows you to signup and sign in using a Google account and you can access and add your files and media on your Google Docs/Drive area making this a fabulous companion to schools using Google Apps for education. You can write by typing or you can write in 'freehand' so you can use your interactive whiteboard to write and archive the lesson to use or refer to later. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

2013 F3 Educator Showcase Submission Form | Foundations for the Future (F3) - 2 views

  •  
    This is a call out specifically to my friends out there in the Atlanta area or anywhere in Georgia to put in for a poster session at Georgia Tech's conference about the Foundations for the future. I wish I could get away but am a bit tied up at school right now. Here's the information and link: "Foundations for the Future (F3), a K-12 outreach and research program at Georgia Tech Research Institute, knows that Georgia teachers are using technology in amazing ways to inspire and engage students. One of the most frequent comments we hear is that it is difficult for educators to know what's working for other educators because there is so much going on, not everyone can afford to attend conferences, and access to technology is inconsistent across the state. We want to honor and highlight teachers and their projects. What better way to get inspired than through a fellow colleague! What better way to meet other passionate educators and share your experiences! F3 is hosting the 2013 F3 Educator Showcase during our May Explorers Guild meeting. The showcase will include a panel discussion along with a poster session. If you are interested in applying for the poster session, all you need to do is follow the guidelines below. Posters will be chosen by a selection committee of F3 partners and Georgia Tech colleagues. Chosen posters will be printed for participants so that after the event they can take the posters back to their school to continue highlighting the good work taking place there! This event helps support F3's mission to help acquire and leverage instructional technology resources for Georgia's classrooms, schools, and districts, share best practices, and establish a community of learners. We look forward to your submissions and can't wait to see you all at the event in May!   Guidelines for Poster Abstract Submission: Title: Accurately and concisely present your idea in 15 words or less Abstract: In 350 words or less, tell us about how using technology
Vicki Davis

Say Farewell To Google Reader | Fast Company - 7 views

  •  
    This is horrible news to most bloggers I know as many of us use Google reader and the apps that go with it like Mr. Reader and Feedly to pull information out of the web. RSS is one of the most useful features of Web 2 and I'm really unhappy w/ Google. iGoogle was a mistake, this a travesty. Google needs to read outliers and the mavens who use tools. I'll be researching new rss tools. This is ridiculous. ""While the product has a loyal following, over the years usage has declined. So, on July 1, 2013, we will retire Google Reader," Urs Hölzle, SVP Technical Infrastructure wrote. "Users and developers interested in RSS alternatives can export their data, including their subscriptions, with Google Takeout over the course of the next four months.""
‹ Previous 21 - 40 of 3278 Next › Last »
Showing 20 items per page