Skip to main content

Home/ educators/ Contents contributed and discussions participated by Anne Bubnic

Contents contributed and discussions participated by Anne Bubnic

Anne Bubnic

Speech Wars: Follow the Candidates' Words - 0 views

  •  
    Weclome to SpeechWars, a great way to see what the candidates are saying. Simply type in a word, click "Go", and SpeechWars shows you how often the candidates used the word in their speeches. You can also compare two words by using both text boxes.

    The United States Library of Congress has selected SpeechWars for inclusion in its official historic collections of Internet materials related to Election 2008. The United States Library of Congress preserves the Nation's cultural artifacts and provides enduring access to them. The Library's traditional functions, acquiring, cataloging, preserving and serving collection materials of historical importance to the Congress and to the American people to foster education and scholarship extend to digital materials, including Web sites. The Library will make this collection available to researchers. The Library's vision is to preserve these Web materials about Election 2008, and to permit researchers from across the world to access them.

Anne Bubnic

Obama Works: Online Youth Activism Breeds Local Change [Video] - 0 views

  •  
    Obama Works is an independent grassroots organization that helps Obama supporters in neighborhoods across the country to organize community service events. The group was founded in early 2008 by a group of Yale students who were inspired by Barack Obama and felt that the energy surrounding his campaign could be channeled to do more than generate votes.
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
Anne Bubnic

Will textbooks go the way of typewriters? - 0 views

  •  
    For anyone who attended college before the era of e-mails and the Internet, the notion that bulky textbooks could someday become obsolete might seem ludicrous. Yet with a wealth of information on virtually any topic now readily accessible online, more people are starting to ponder if these hefty staples of education will remain relevant.
Anne Bubnic

Blogs allow kids at Gilbert school to express feelings - 0 views

  •  
    Students, administrators and teachers at Gilbert Classical Academy have a new tool to express themselves that is rarely tapped by schools as a teaching aid: blogs. Blogs have been available on the Internet for years, offering Web users an opportunity to opine on various subjects and post images in a personal journal that anyone on the Internet can read. But schools have generally not utilized them as a classroom tool because officials have such worries as: What if inappropriate messages are posted? What if a hacker steals personal information on a child or staff member?
Anne Bubnic

Water Quality Service Learning Program - 0 views

  •  
    The California Water Boards Water Quality Service Learning Program Web site is designed to introduce teachers to an innovative student-centered science investigation focused on California's growing problem of polluted runoff. The resources are designed to be used with students enrolled in grades 4 through 6.
Anne Bubnic

TPCK - Technological Pedagogical Content Knowledge - TPCK - 0 views

  •  
    Technological Pedagogical Content Knowledge (TPCK) attempts to capture some of the essential qualities of knowledge required by teachers for technology integration in their teaching, while addressing the complex, multifaceted and situated nature of teacher knowledge. At the heart of the TPCK framework, is the complex interplay of three primary forms of knowledge: Content (CK), Pedagogy (PK), and Technology (TK).
Anne Bubnic

The new top 10 school supplies everyone should have - 0 views

  •  
    The new essentials: Top 10 School Supplies for today's students. These free tools enable students to take advantage of the new learning possibilities the Web has to offer, such as making research easier, or finding better, cheaper ways of doing what they're already doing.
Anne Bubnic

The Periodic Table of Videos - University of Nottingham - 0 views

  •  
    Tables charting the chemical elements have been around since the 19th century - but this modern version has a short video about each one.
Anne Bubnic

Instant Messaging Found to Slow Students' Reading - 0 views

  •  
    New study on the effects of instant messaging on reading comprehension. Students who send and receive instant messages while completing a reading assignment take longer to get through their texts but apparently still manage to understand what they're reading, according to one of the first studies to explore how the practice affects academic learning.
Anne Bubnic

New U.S. Research Center to Study Education Technology - 0 views

  •  
    Congress has authorized a new federal research center that will be charged with helping to develop innovative ways to use digital technology at schools and in universities. The National Center for Research in Advanced Information and Digital Technologies was included as part of the latest reauthorization Requires Adobe Acrobat Reader of the Higher Education Act, approved last month. President Bush signed the law on Aug. 14. The center will be charged with supporting research and development of new education technologies, including internet-based technologies. It will also help adapt techniques already widely used in other sectors, such as advertising and the military, to classroom instruction.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
« First ‹ Previous 101 - 113 of 113
Showing 20 items per page