Skip to main content

Home/ educators/ Group items tagged plain

Rss Feed Group items tagged

Sandy Kendell

DnaTube.com - Scientific Video Site - 27 views

  •  
    DnaTube is a scientific site providing video based studies, lecturers and seminars. DnaTube is a non-profit video site which is aiming to be a visual scientific resource for its visitors. As graduate students, we know that it is difficult to understand biological mechanism by reading plain text. And we know that a picture says more than a thousand words. We believe the video-based explanations of biological concepts will remove the barrier in front of the people desiring to enhance their scientific knowledge.
Kelly Faulkner

Create webpages mirrors - TextMirror - 11 views

  •  
    service that will convert blocked websites to plain text so you can read them. if your school blocking service blocks blogs you wish to read, this could help you.
Toby Fischer

WNY Education Associates » Goomoodleikiog: Transforming Teaching in Plain Eng... - 0 views

  •  
    Great common craft style video about web2.0 in education
yc c

pdf document - 8 views

  •  
    Critics of wikis as research sources often point to the potential for students to stumble across inaccurate content as a fatal flaw that make wikis almost worthless. "How can we promote wikis in our classrooms," the argument goes, "if you can't trust what's posted there? I don't want my students exposed to learning tools that are just plain wrong!" Teachers using wikis successfully in their classrooms, however, embrace inaccurate content posted on classroom wikis as a teachable moment because they know that succeeding as consumers of information in the 21st Century requires students to develop a healthy skepticism of any content posted online. In a world where content is constantly changing and publishing is easy for anyone, researchers simply cannot assume that digital sources-wikis, blogs, websites, online videos-are accurate and up-to-date. Wikis give teachers built in opportunities to teach lessons about the reliability of online content to students. Errors-which are inevitable in student projects-can be spotlighted and corrected, and students can be introduced to strategies for identifying content worth trusting.
Stephanie Sandifer

Jodi Beggs: How Video Will Likely Create Rather Than Kill the Classroom "Star" - 5 views

  • Technology has enabled inexpensive reproduction of a wide variety of media, which has in turn radically transformed the structures of a number of industries.
  • It's hard to dispute the hypothesis that the higher instructor quality would likely overcome the modest benefits of face-to-face instruction, and I would be willing to bet that this form of virtual instruction would come as a welcome change for those students taught by instructors who are teaching merely to fulfill university requirements, are using courses to push their own agendas, or just plain don't speak English
  • The traditional model of education is not altogether different from the old-time theater or concert model. On the up side, customers enjoy a live experience where they can potentially interact with the performer or instructor. On the down side, this model is limited in its scalability (especially where simply increasing venue or classroom size is not reasonable) and thus more expensive than its virtual counterpart. Given the skyrocketing cost of college education, the potential appeal of virtual instruction is becoming quite significant.
  • ...1 more annotation...
  • Virtual instruction has the potential not only to give a large number of students access to top instructors at lower cost but also to provide the incentives to attract and retain top teaching talent in the first place.
  •  
    Virtual instruction has the potential not only to give a large number of students access to top instructors at lower cost but also to provide the incentives to attract and retain top teaching talent in the first place. 
Terry Elliott

World Without Walls: Learning Well with Others | Edutopia - 0 views

  • We must also expand our ability to think critically about the deluge of information now being produced by millions of amateur authors without traditional editors and researchers as gatekeepers. In fact, we need to rely on trusted members of our personal networks to help sift through the sea of stuff, locating and sharing with us the most relevant, interesting, useful bits. And we have to work together to organize it all, as long-held taxonomies of knowledge give way to a highly personalized information environment.
    • Jeff Richardson
       
      Good reason for teaching dig citizenship
    • Terry Elliott
       
      What Will suggests here is rising complexity, but for this to succeed we don't need to fight our genetic heritage. Put yourself on the Serengeti plains, a hunter-gatherer searching for food. You are thinking critically about a deluge of data coming through your senses (modern folk discount this idea, but any time in jobs that require observation in the 'wild' (farming comes to mind) will disabuse you rather quickly that the natural world is providing a clear channel.) You are not only relying upon your own 'amateur' abilities but those of your family and extended family to filter the noise of the world to get to the signal. This tribe is the original collaborative model and if we do not try to push too hard against this still controlling 'mean gene' then we will as a matter of course become a nation of collaborative learning tribes.
  • Collaboration in these times requires our students to be able to seek out and connect with learning partners, in the process perhaps navigating cultures, time zones, and technologies. It requires that they have a vetting process for those they come into contact with: Who is this person? What are her passions? What are her credentials? What can I learn from her?
    • Terry Elliott
       
      Aye, aye, captain. This is the classic problem of identity and authenticity. Can I trust this person on all the levels that are important for this particular collaboration? A hidden assumption here is that students have a passion themselves to learn something from these learning partners. What will be doing in this collaboration nation to value the ebb and flow of these learners' interests? How will we handle the idiosyncratic needs of the child who one moment wants to be J.K.Rowling and the next Madonna. Or both? What are the unintended consequences of creating an truly collaborative nation? Do we know? Would this be a 'worse' world for the corporations who seek our dollars and our workers? Probably. It might subvert the corporation while at the same moment create a new body of corporate cooperation. Isn't it pretty to think so.
  • Likewise, we must make sure that others can locate and vet us.
  • ...9 more annotations...
  • technical know-how is not enough. We must also be adept at negotiating, planning, and nurturing the conversation with others we may know little about -- not to mention maintaining a healthy balance between our face-to-face and virtual lives (another dance for which kids sorely need coaching).
    • Terry Elliott
       
      All of these skills are technical know how. We differentiate between hard and soft skills when we should be showing how they are all of a piece. I am so far from being an adequate coach on all of these matters it appalls me. I feel like the teacher who is one day ahead of his students and fears any question that skips ahead to chapters I have not read yet.
  • The Collaboration Age comes with challenges that often cause concern and fear. How do we manage our digital footprints, or our identities, in a world where we are a Google search away from both partners and predators? What are the ethics of co-creation when the nuances of copyright and intellectual property become grayer each day? When connecting and publishing are so easy, and so much of what we see is amateurish and inane, how do we ensure that what we create with others is of high quality?
    • Terry Elliott
       
      Partners and predators? OK, let's not in any way go down this road. This is the road our mainstream media has trod to our great disadvantage as citizens. These are not co-equal. Human brains are not naturally probablistic computer. We read about a single instance of internet predation and we equate it with all the instances of non-predation. We all have zero tolerance policies against guns in the school, yet our chances of being injured by those guns are fewer than a lightning strike. We cannot ever have this collaborative universe if we insist on a zero probability of predation. That is why, for good and ill, schools will never cross that frontier. It is in our genes. "Better safe than sorry" vs. "Risks may be our safeties in disguise."
  • Students are growing networks without us, writing Harry Potter narratives together at FanFiction.net, or trading skateboarding videos on YouTube. At school, we disconnect them not only from the technology but also from their passion and those who share it.
  • The complexities of editing information online cannot be sequestered and taught in a six-week unit. This has to be the way we do our work each day.
  • The process of collaboration begins with our willingness to share our work and our passions publicly -- a frontier that traditional schools have rarely crossed.
  • Look no further than Wikipedia to see the potential; say what you will of its veracity, no one can deny that it represents the incredible potential of working with others online for a common purpose.
  • The technologies we block in their classrooms flourish in their bedrooms
  • Anyone with a passion for something can connect to others with that same passion -- and begin to co-create and colearn the same way many of our students already do.
  • I believe that is what educators must do now. We must engage with these new technologies and their potential to expand our own understanding and methods in this vastly different landscape. We must know for ourselves how to create, grow, and navigate these collaborative spaces in safe, effective, and ethical ways. And we must be able to model those shifts for our students and counsel them effectively when they run across problems with these tools.
  •  
    Article by Wil Richardson on Collaboration
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Angela Maiers

YouTube - Electing a US President in Plain English - 0 views

  •  
    Another great find from Common Craft
anonymous

Video: Podcasting in Plain English | Common Craft - 0 views

  •  
    Despite being around for years, podcasting is often misunderstood. This video is our way of building awareness and hopefully adoption of a technology that any computer user can use.
Jeff Johnson

DigiTales - The Art of Telling Digital Stories - 0 views

  • If you don’t have a good or powerful story, script, and storyboard, then there will never be enough decorating that technology can do to cover it up. On the other hand, demonstrating exemplar craftsmanship with mixing the technical elements in artful ways to unfold your story creates compelling, insightful, original and memorable pieces of communication. The richness of a good story can be diluted when technical elements are not artfully developed, over used, distracting, or just plain annoying.
yc c

Home | Common Craft - Explanations In Plain English - 0 views

  •  
    Organizations of all types purchase our videos for training and education
Dave Truss

Protecting Reputations Online in Plain English - Common Craft - Our Product is Explanation - 9 views

  •  
    Aimed at young or inexperienced Web users, this video explains the long term risks of sharing inappropriate information online.
Dave Truss

Is the term 21st Century out of date? | U Tech Tips - 7 views

  • They all tell us what we want our kids to turn out like. They all remind us what we need to value in education. But we don’t. At least not in action. (GENERALIZATION ALERT:) Schools continue to push content-driven curricula. Teachers continue to plan lessons building expertise within the discipline. And if students get our “21st Century Skills”, it’s because of an exception-to-the-rule teacher, choices the students make outside of class, or just plain luck. We all know that what we need is buy-in. We see the success stories, celebrate the schools that do it, and ultimately wonder, what does it take to make it work everywhere? Buy-in. So back to the teacher accessibility issue. How do we ensure that teachers see teaching a 21st Century Curriculum as part of their job?
  •  
    Remind yourselves that your teachers have ALWAYS been trying to prepare their students to succeed in the world they will live in. And then collaborate with them on how that world has changed.
anonymous

YouTube - Phishing Scams in Plain English - 6 views

shared by anonymous on 30 Oct 09 - Cached
  •  
    A short guide to recognizing and avoiding phishing scams. This video comes in an unbranded "presentation quality" version that can be licensed for use in the workplace.
‹ Previous 21 - 37 of 37
Showing 20 items per page