Skip to main content

Home/ educators/ Group items tagged meaning

Rss Feed Group items tagged

Roland O'Daniel

Strategies for online reading comprehension - 17 views

  • Colorado State University offers a useful guide to reading on the web. While it is aimed at college students, much of the information is pertinent to readers of all ages and could easily be part of lessons in the classroom. The following list includes some of the CSU strategies to strengthen reading comprehension, along with my thoughts on how to incorporate them into classroom instruction: Synthesize online reading into meaningful chunks of information. In my classroom, we spend a lot of time talking about how to summarize a text by finding pertinent points and casting them in one’s own words. The same strategy can also work when synthesizing information from a web page. Use a reader’s ability to effectively scan a page, as opposed to reading every word. We often give short shrift to the ability to scan, but it is a valuable skill on may levels. Using one’s eye to sift through key words and phrases allows a reader to focus on what is important. Avoid distractions as much as necessary. Readbility is one tool that can make this possible. Advertising-blocking tools are another effective way to reduce unnecessary, and unwanted, content from a web page. At our school, we use Ad-Block Plus as a Firefox add-on to block ads. Understand the value of a hyperlink before you click the link. This means reading the destination of the link itself. It is easier if the creator of the page puts the hyperlink into context, but if that is not the case, then the reader has to make a judgment about the value, safety, and validity of the link. One important issue to bring into this discussion is the importance of analyzing top-level domains. A URL that ends in .gov, for example, was created by a government entity in the U.S. Ask students what it means for a URL to end in .edu. What about .org? .com? Is a .edu or .org domain necessarily trustworthy? Navigate a path from one page in a way that is clear and logical. This is easier said than done, since few of us create physical paths of our navigation. However, a lesson in the classroom might do just that: draw a map of the path a reader goes on an assignment that uses the web. That visualization of the tangled path might be a valuable insight for young readers.
Dean Mantz

News: Questioning a Degree's Value - Inside Higher Ed - 4 views

  •  
    Does a Master's Degree mean your a good educator?
Jeff Johnson

Plagiarism Definition - 0 views

  •  
    Plagiarism, believe it or not, comes from a Latin verb that means, "to kidnap." If you plagiarize you're kidnapping and stealing others' hard work and intellectual property. It is academic and public dishonesty. You wouldn't want someone stealing your hard work, intentionally or even unintentionally, would you? Of course not.
Vicki Davis

» The 2008 Edublog Awards! The Edublog Awards - 0 views

  •  
    2008 Edublog awards are open - nominate your favorites. I've had the honor of being nominated for these awards since I started blogging, but have never won a coveted "Eddie." This is one of the few awards I do think means something, although no one should blog motivated by receiving one. We blog because we believe in the nobility of what we do (teach tomorrow's future) and in sharing with others around the world of a like mind.
Vicki Davis

Google Orkut users stealing photos. - 0 views

  •  
    Interesting comments here on this photo about Google Orkut and people stealing Flickr Pictures of children - this is from 2007 but the conversation is interesting -- we want to SHARE photos but not SHARE them in inappropriate ways -- how can we license for NON ADULT use -- and doesn't "adult" have two meanings here?
Jeff Johnson

Amazon.com: A Tribe Apart: A Journey into the Heart of American Adolescence (Ballantine... - 0 views

  •  
    Why do teenagers so often seem like a different species? Journalist Patricia Hersch gives a troubling answer in her fascinating, up-close-and-personal look at what it means to be a teen in today's American high schools. Rather than interviewing "high-risk" teens (those already swept up in a cycle of drug use, gang violence, or unintended pregnancy, for example), Hersch focuses her attention on "regular kids"--adolescents who are average achievers on academic and social levels. In light of this, A Tribe Apart is all the more startling to read: Hersch's investigative approach makes it impossible for parents to shrug off their responsibilities by saying "That's not my kid." This is your kid.
Vicki Davis

Twitter Groups - teachers ~ teachers - 0 views

  •  
    If you are a teacher on twitter, you can "join" this group - which means nothing except your name is added to a list. I like this b/c it helps teachers find other teachers. Wish it let you put a little info but you can look at the twitter id's - I like that it is automated even the excessive ads are a little bothersome, I can live with that -- share your id or make another group.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Eloise Pasteur

Doing Digital Scholarship: Presentation at Digital Humanities 2008 « Digital ... - 0 views

  • My session, which explored the meaning and significance of “digital humanities,” also featured rich, engaging presentations by Edward Vanhoutte on the history of humanities computing and John Walsh on comparing alchemy and digital humanities.
  • I wondered: What is digital scholarship, anyway?  What does it take to produce digital scholarship? What kind of digital resources and tools are available to support it? To what extent do these resources and tools enable us to do research more productively and creatively? What new questions do these tools and resources enable us to ask? What’s challenging about producing digital scholarship? What happens when scholars share research openly through blogs, institutional repositories, & other means?
  • I decided to investigate these questions by remixing my 2002 dissertation as a work of digital scholarship.  Now I’ll acknowledge that my study is not exactly scientific—there is a rather subjective sample of one.  However, I figured, somewhat pragmatically, that the best way for me to understand what digital scholars face was to do the work myself. 
  • ...6 more annotations...
  • The ACLS Commission on Cyberinfrastructure’s report points to five manifestations of digital scholarship: collection building, tools to support collection building, tools to support analysis, using tools and collections to produce “new intellectual products,” and authoring tools. 
  • Tara McPherson, the editor of Vectors, offered her own “Typology of Digital Humanities”: •    The Computing Humanities: focused on building tools, infrastructure, standards and collections, e.g. The Blake Archive •    The Blogging Humanities: networked, peer-to-peer, e.g. crooked timber •    The Multimodal Humanities: “bring together databases, scholarly tools, networked writing, and peer-to-peer commentary while also leveraging the potential of the visual and aural media that so dominate contemporary life,” e.g. Vectors
  • My initial diagram of digital scholarship pictured single-headed arrows linking different approaches to digital scholarship; my revised diagram looks more like spaghetti, with arrows going all over the place.  Theories inform collection building; the process of blogging helps to shape an argument; how a scholar wants to communicate an idea influences what tools are selected and how they are used.
  • I looked at 5 categories: archival resources as well as primary and secondary books and journals.   I found that with the exception of archival materials, over 90% of the materials I cited in my bibliography are in a digital format.  However, only about 83% of primary resources and 37% of the secondary materials are available as full text.  If you want to do use text analysis tools on 19th century American novels or 20th century articles from major humanities journals, you’re in luck, but the other stuff is trickier because of copyright constraints.
  • I found that there were some scanning errors with Google Books, but not as many as I expected. I wished that Google Books provided full text rather than PDF files of its public domain content, as do Open Content Alliance and Making of America (and EAF, if you just download the HTML).  I had to convert Google’s PDF files to Adobe Tagged Text XML and got disappointing results.  The OCR quality for Open Content Alliance was better, but words were not joined across line breaks, reducing accuracy.  With multi-volume works, neither Open Content Alliance nor Google Books provided very good metadata.
  • To make it easier for researchers to discover relevant tools, I teamed up with 5 other librarians to launch the Digital Research Tools, or DiRT, wiki at the end of May.
  •  
    Review of digital humanities scholarship tools
Jerry Swiatek

PicLits.com - Create a PicLit - 0 views

  •  
    PicLits.com is a creative writing site that matches beautiful images with carefully selected keywords in order to inspire you. The object is to put the right words in the right place and the right order to capture the essence, story, and meaning of the picture.
Jeff Johnson

Myths About Learning (SMR Blog) - 0 views

  •  
    Researchers at the University of Tennessee list out several myths about learning. The premise that everyone starts with the same base of knowledge about a particular subject, everyone learns at the same pace, everyone learns best by listening, everyone will bridge naturally from theory to application, everyone should learn on his or her own rather than in collaboration and learning is the transfer of knowledge from a teacher to a passive learner results in excessive telling or lecture. "We don't remember information totally; we reconstruct the way information connects to [other] information,"…"That means learners have to reconstruct the interconnectors or forget what they've learned in a short time. The stuff you remember is what you use to make the interconnections." FUN can play a great role in making the interconnections or associations.
Vicki Davis

Pest Control Information for School Kids and Teachers - PestWorldforKids.org - 0 views

  •  
    This site provides resources and games explaining to elementary students what we consider to be "pests".
  •  
    Just got this in my email. I could see some really fun, funny public service announcements -- cross curricular project for science and technology. This is what they sent me: "The contest challenges students in grades 4 through 8 to use their biology and entomology knowledge, as well as their creativity, to create educational public service announcements (PSAs) that discuss the health and property risks posed by household pests. The grand prize winning entry will receive $3,000 for their school's science department! We know that this award could mean a lot to one of the many schools in the country that are being forced to cut budgets and programs in this difficult economy. As a non-profit organization, NPMA is committed to science education, and never promotes specific products or services. I know that Cool Cat Teachers covers a wide range of topics, but we are hoping that the many science teachers who read your content would be interested in the contest for their schools. We would deeply appreciate your help in spreading the word about this fun and educational contest. The press release below has more information on the contest rules and details. Additional information, including sample PSAs and lesson plans for creating PSAs, are available at www.PestWorldForKids.org."
  •  
    Science contest on this website for creating a PSA.
Angela Maiers

Are You a Writer? | Copyblogger - 0 views

  •  
    Great post on what it means to be a writer!
Vicki Davis

Primary teachers to gain HECS relief | The Courier-Mail - 0 views

  •  
    Math and Science professionals who to into primary teaching in Australia will get half of their student loan forgiven.
  •  
    In Australia, they are taking an initiative to get more math and science graduates into primary teaching -- those who do so will have a 50% refund on their loan payments. This in response to a study in July from the National Numeracy Review that "concluded that systematic teaching of numeracy in the early years of schooling, in maths lessons and across the wider curriculum, was essential if these trends were to be reversed." I find this interesting and hope that it will encourage people who love math and science AND STUDENTS will accept. Just a geek doesn't mean you love students or want to teach them.
Vicki Davis

District Business - 0 views

  • the possible recording of incoming calls, a serious problem with the district's grade reporting software, and a breach of a computer containing confidential student information that was not reported to the state.
  •  
    Whistleblower lawsuit from an IT director.
  •  
    Some push back in IT is happening such as this case with an IT director who said he was fired for "blowing the whistle" on innappropriate IT behavior such as problems with the grade reporting software and a computer with confidential student information that was breached without reporting it to the state. These sorts of things have both sides. The point that I would take here is to listen to IT directors when they have concerns: just because you don't understand the problem doesn't mean there is a problem, and that ethics must be applied when things are dealt with in IT.
Jeff Johnson

Washington State: More Algebra a Must - 0 views

  •  
    The state Board of Education voted Thursday to require all high-school students to pass algebra II to graduate, and it agreed to work toward raising other graduation requirements as well. Board members have been discussing, for example, whether to increase the number of classes students would have to complete to earn their diplomas, essentially making the list equal to what they''d need to apply to public, four-year colleges in Washington. That would mean additional classes in English, science, foreign language and more.
Vicki Davis

Digital Citizenship - What does it mean to our students? - Parents as Partners - 0 views

  • One of the barriers to using Web 2.0 tools is the poor understanding of the learning opportunities for using the tools, as parents, teachers and students individually and collectively.
  •  
    The need for action is highlighted in this article by an edublogger. There is a mention of the Advocates project.
Ben W

Animations for Earthquake Terms and Concepts - 0 views

  •  
    USGS (means fair-use!) animations of faults & earthquake terminology. Quick, visual, and helpful
John Evans

Social Media U: Take a Class in Social Media - ReadWriteWeb - 0 views

  •  
    Social media. Web 2.0. You know what these things are and you take advantage of them every day on the net. Whether you're socializing on Facebook, updating Twitter, or just adding a new bookmark to Ma.gnolia, social media has become an integral part of our daily lives. However, that doesn't mean that it's something that everyone innately understands or knows how to use - especially when it comes to using it for marketing, PR, or other business-related purposes. That's why many of today's colleges and universities are now offering "social media" classes as an option for their students.
Dean Loberg

Education Week's Digital Directions: Building Gaming Into Science Education - 0 views

  • "I've had teachers tell me,” says Eklund, “that after they introduced the game to their students, the classroom went completely silent because all of the kids were just reading." "You just don't get that kind of engagement and involvement with the story" with a textbook, he says.
    • Brian C. Smith
       
      Is this because of the visual appeal or the storyline? I can see this happening, but does silence mean high levels of engagement?
    • Dean Loberg
       
      Assuming that they are not sleeping I think it does mean engagement, but engagement does not equal education. It depends on the content as well.
  • A report written by researchers about The River City Project for a 2006 conference concluded "that students learned biology content, that students and teachers were highly engaged, that student attendance improved, that disruptive behavior dropped, that students were building 21st-century skills in virtual communication and expression, and importantly, that using this type of technology in the classroom can facilitate good inquiry learning."
    • Brian C. Smith
       
      Is this limited to only the River City Project alone though? How does it promote more inquiry, problem and project-based learning in other content?
  • ...4 more annotations...
  • "I'm in a unique situation where there's a computer at every lab table," he says, pointing out that many teachers do not have that ratio of students to computers.
  • when the games don't work properly, but most teachers don’t have that level of technical skill, she points out.
  • "There are little things you need to know," she says, to keep the games running smoothly. "[Otherwise], it's not going to work in the classroom, and teachers aren't going to use it."
  • "If [the game] doesn't have a focus or clear reason for what they're doing, it really doesn't work," says Pokrzywinski. Adapting games to the curriculum is possible, she says, but it takes time—something many teachers don't have.
  •  
    Science and gaming
  •  
    Science and gaming
« First ‹ Previous 81 - 100 of 251 Next › Last »
Showing 20 items per page