Skip to main content

Home/ educators/ Group items matching ""web content"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Mnemograph: Web Based Timeline Software - 0 views

    • Clif Mims
       
      This web application could be used with the following: -Research/ Reports in any content area -Lab reports -Data collection/ analysis (research journal/ log, data trail, notes, formation of ideas and early possible findings, etc.) -Pre- and post-assessment -Ogranizer -Group or whole-class projects -Self-paced instruction -Journal writing exercise spanning an extended timeframe -Group/ Project management
  •  
    This web application could be used with the following: -Research/ Reports in any content area -Lab reports -Data collection/ analysis (research journal/ log, data trail, notes, formation of ideas and early possible findings, etc.) -Pre- and post-assessment -Ogranizer -Group or whole-class projects -Self-paced instruction -Journal writing exercise spanning an extended timeframe -Group/ Project management -In IDT 7/8052
1More

The findingDulcinea Blog: Why SweetSearch Is the Best Search Engine for Students - 11 views

  •  
    SweetSearch is the product of 100,000+ hours of research that went into creating findingDulcinea's 700+ Web Guides and thousands of articles. This content links to tens of thousands of Web sites that have been evaluated and deemed reliable by our...
1More

ALA | AASL Best Web sites for Teaching and Learning Award Land Mark Award - 0 views

  •  
    The Landmark Websites are honored due to their exemplary histories of authoritative, dynamic content and curricular relevance. They are free, web-based sites that are user friendly and encourage a community of learners to explore and discover and provide a foundation to support 21st-century teaching and learning.
1More

PBWorks for Wikis Training Course - 1 views

  •  
    "A wiki is a website that allows the creation and editing of any number of interlinked web pages via a web browser. Wikis allow content to be easily created and updated. They also allow previous versions of documents to be accessible. PBWorks is a Website that allows the creation of wikis. These wikis can be used for educational purposes, for work or in community organisations. This free online course shows you how to create a wiki with PBWorks in an easy, step-by-step manner. This course is ideal for learners who want to learn how to set up a wiki and lack the skills or knowledge to do it. "
1More

Searcheeze - 12 views

  •  
    A great site for making online magazines using content from the internet. Add articles, videos, audio and more in just a few clicks. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
10More

Past Issues - UI Design Newsletter - 0 views

  • You can ask them what they noticed, but self reporting of this sort is notoriously inaccurate – if you ask people to point to what they look at, and meld that with an eyetracking overlay of where their eyes actually went there is a startling gap.
  • applied eyetracking methodologies to measure the attention-drawing effects of new and newly modified elements of search results pages.
  • there is a strong correlation where people look and where they click on search results pages
  • ...5 more annotations...
  • They look a bit like hurricane maps. People get most excited about findings where the gaze patterns are highly organized... and look a bit like a well-formed hurricane.
  • The visual design works!"
  • So, the visual design objective of a website is to draw your attention to move around the page.
  • longest looking times may not. In fact, longest looking times can, in some cases, reflect multiple lookbacks and dwell time indicating confusion or uncertainty about a next step, a label or an interaction.
  • If there is no fixation we cannot possibly process the content. If there is no fixation we can't be influenced. Amazing, but the part we should pay attention to in our eyetracking results is probably the area that is NOT highlighted!!
  •  
    Article about how people look at web pages.
  •  
    As you design web pages for use with your students -- do you wonder why they don't sometimes SEE what you're putting in front of them -- it is because of eye movement. It is design!!! This paper writes about the effect of website design on eye movement. Those who are desigining online curriculum need to understand this. My sister, Sarah, has been an onlien professor for Savannah College of Art and Design for a while, ,and this is something she talks about in her courses and shares with me. This is why I emphasize wiki layout and design w/ my students (like having a table of contents and white space.) If it is not attractive, it just doesn't exist, because it IS NOT READ! Educators will do well to remember that!
2More

Educreations - 24 views

  •  
    Move over Khan Academy. Educreations is here with a super simple web or iPad app that lets you record lessons to share with your students, wherever they are. If they enable one thing like common core tagging (tag it with the standard) and enough contribute we will have an incredibly powerful tool.
  •  
    The strength of Khan Academy's tutorials is content and clear presentation of this content. I didn't find either in Educreations' showcased examples: most could just be presented as a good old slideshow. Granted, a few do have an audio comment. But you can do that with slidecasts too (e.g. you can synch an audio file with your slides on Screencast.net or on MyPlick.com) Moreover, there is no way to caption such Educreations presentations including audio for the deaf, which means they can't be used in schools in US, Italy and other countries that have laws imposing accessibility for all for educational materials. And you can't subtitle them for people who don't know the original language, which severely curtails the potential use. Khan Academy, on the other hand has an international captioning/subtitling team - see http://gigaom.com/video/khan-academy-universal-subtitles/ . So OK, Educreations have an iPad app - the point is that Khan Academy's tutorials don't need one. The real difference is that Educreations' content is crowdsourced and the content of Khan Academy's tutorials isn't: not enough to outweigh the accessibility and internationalization issues above. Teachers can already produce their own online tutorials as slideshows, slidecasts or videos that can be captioned/subtitled in other languages with other platforms.
1More

Six Apart - Pownce - 0 views

  •  
    GOt this letter from Pownce today: "We are sad to announce that Pownce is shutting down on December 15, 2008. As of today, Pownce will no longer be accepting new users or new pro accounts. To help with your transition, we have built an export tool so you can save your content. You can find the export tool at Settings > Export. Please export your content by December 15, 2008, as the site will not be accessible after this date." I predict that 2009 will be the year many Web 2.0 apps were "left behind." Export that data -- bye bye lots of stuff.
1More

Google Code University - Google Code - 16 views

  •  
    This website provides tutorials and sample course content so CS students and educators can learn more about current computing technologies and paradigms. In particular, this content is Creative Commons licensed which makes it easy for CS educators to use in their own classes. The Courses section contains tutorials, lecture slides, and problem sets for a variety of topic areas: AJAX Programming Algorithms Distributed Systems Web Security Languages In the Tools 101 section, you will find a set of introductions to some common tools used in Computer Science such as version control systems and databases.
3More

'Generation V' Defies Traditional Demographics - 8 views

  • Generation V is not defined by age, gender, social class or geography. Instead, it is based on achievement, accomplishments and an increasing preference for the use of digital media channels to discover information, build knowledge and share insights.
  • Findings about these Generation V segments: Up to 3% will be creators, providing original content. They can be advocates that promote products and services. Between 3% and 10% will be contributors who add to the conversation, but don’t initiate it. They can recommend products and services as customers move through a buying process, looking for purchasing advice. Between 10% and 20% will be opportunists, who can further contributions regarding purchasing decisions. Opportunists can add value to a conversation that’s taking place while walking through a considered purchase. Approximately 80% will be lurkers, essentially spectators, who reap the rewards of online community input but absorb only what is being communicated. They can still implicitly contribute and indirectly validate value from the rest of the community. All users start out as lurkers.
  •  
    "Generation V is not defined by age, gender, social class or geography. Instead, it is based on achievement, accomplishments and an increasing preference for the use of digital media channels to discover information, build knowledge and share insights." Additionally the percentages that create content, contribute, etc. affects classroom and project planning. Do we allow students to "lurk" Findings about these Generation V segments: * Up to 3% will be creators, providing original content. They can be advocates that promote products and services. * Between 3% and 10% will be contributors who add to the conversation, but don't initiate it. They can recommend products and services as customers move through a buying process, looking for purchasing advice. * Between 10% and 20% will be opportunists, who can further contributions regarding purchasing decisions. Opportunists can add value to a conversation that's taking place while walking through a considered purchase. * Approximately 80% will be lurkers, essentially spectators, who reap the rewards of online community input but absorb only what is being communicated. They can still implicitly contribute and indirectly validate value from the rest of the community. All users start out as lurkers."
1More

Maria Popova: In a new world of informational abundance, content curation is ... - 7 views

  •  
    Literacy literature digital literacy future of education curation of content.  Good writeup on Twitters role in curation
1More

6 Top Free Online Tools for Support Teaching and Learning - 22 views

  •  
    The six top free online tools were selected from available web 2.0 tools for teaching and learning using presentations, blogging, and bookmarking online resources. There are many excellent online tools available in these three categories, making the selection difficult at best. However, the selection was made based on reviewing available online resources along with other contributions and feedback from teachers.
1More

Web 2.0 and Emerging Learning Technologies - Wikibooks, collection of open-content text... - 0 views

  •  
    A wiki about Web 2.0 and education.
1More

TeachersFirst: The web resource by teachers, for teachers - 0 views

  •  
    TeachersFirst is a rich collection of lessons, units, and web resources designed to save teachers time by delivering just what they need in a practical, user-friendly, and ad-free format. We offer our own professional and classroom-ready content along with thousands of reviewed web resources, including practical ideas for classroom use and safe classroom use of Web 2.0. Busy teachers, parents, and students can find resources using our subject/grade level search, keyword search, or extensive menus.
1More

Record by phone with Gabcast.com - 7 views

  •  
    "# record using your phone or VoIP Recording audio has never been easier! Simply call us using a touch-tone telephone or a VoIP client. No microphone or audio editing software required. VoIP recording is FREE! Telephone recording is just $0.10/min - there are no other costs involved. # create podcasts Are you an audiophile? No. Then why concern yourself with the complexities of podcasting? Let us do the heavy lifting. Yes. Upload your studio produced episodes. Each of your channels can be subscribed to by an RSS client like iTunes, IE7, Firefox or any number of web-based portals. # post audio to your blogs Post audio content to your blogs! We integrate with popular blogging software like Blogger, TypePad, WordPress and more! # create audio greetings Create audio greetings to welcome users to your website! Or use a greeting as an audio avatar or signature in an email! # host conference calls Connect with colleagues and friends in conference calls! # tell me more "
1More

Nota : Casual Collaboration - 0 views

  •  
    Mash your ideas and media together with friends in a dynamic whiteboard wiki. Using photos, videos, and other web content you can instantly create brainstorms, presentations, scrapbooks, and enjoy an interactive chat with more than 50 friends.
2More

Spongelab | A Global Science Community | Home page - 17 views

  •  
    An amazing science site with a large number of magnificent animations and graphics to help you explain science principles. Content suitable for older students. http://ictmagic.wikispaces.com/Science
  •  
    mission is to educate students in the sciences by building content-rich immersive teaching tools designed around discovery-based learning that are accessible to educators and learners at school, at home and in the general public. Spongelab Interactive builds their own products and offers custom production services for the global education community. Their unique approach around integrating educational design with advance web & gaming technology is planting the seeds for continued innovation of advanced communication and education products.
10More

Doing Digital Scholarship: Presentation at Digital Humanities 2008 « Digital ... - 0 views

  • My session, which explored the meaning and significance of “digital humanities,” also featured rich, engaging presentations by Edward Vanhoutte on the history of humanities computing and John Walsh on comparing alchemy and digital humanities.
  • I wondered: What is digital scholarship, anyway?  What does it take to produce digital scholarship? What kind of digital resources and tools are available to support it? To what extent do these resources and tools enable us to do research more productively and creatively? What new questions do these tools and resources enable us to ask? What’s challenging about producing digital scholarship? What happens when scholars share research openly through blogs, institutional repositories, & other means?
  • I decided to investigate these questions by remixing my 2002 dissertation as a work of digital scholarship.  Now I’ll acknowledge that my study is not exactly scientific—there is a rather subjective sample of one.  However, I figured, somewhat pragmatically, that the best way for me to understand what digital scholars face was to do the work myself. 
  • ...6 more annotations...
  • The ACLS Commission on Cyberinfrastructure’s report points to five manifestations of digital scholarship: collection building, tools to support collection building, tools to support analysis, using tools and collections to produce “new intellectual products,” and authoring tools. 
  • Tara McPherson, the editor of Vectors, offered her own “Typology of Digital Humanities”: •    The Computing Humanities: focused on building tools, infrastructure, standards and collections, e.g. The Blake Archive •    The Blogging Humanities: networked, peer-to-peer, e.g. crooked timber •    The Multimodal Humanities: “bring together databases, scholarly tools, networked writing, and peer-to-peer commentary while also leveraging the potential of the visual and aural media that so dominate contemporary life,” e.g. Vectors
  • My initial diagram of digital scholarship pictured single-headed arrows linking different approaches to digital scholarship; my revised diagram looks more like spaghetti, with arrows going all over the place.  Theories inform collection building; the process of blogging helps to shape an argument; how a scholar wants to communicate an idea influences what tools are selected and how they are used.
  • I looked at 5 categories: archival resources as well as primary and secondary books and journals.   I found that with the exception of archival materials, over 90% of the materials I cited in my bibliography are in a digital format.  However, only about 83% of primary resources and 37% of the secondary materials are available as full text.  If you want to do use text analysis tools on 19th century American novels or 20th century articles from major humanities journals, you’re in luck, but the other stuff is trickier because of copyright constraints.
  • I found that there were some scanning errors with Google Books, but not as many as I expected. I wished that Google Books provided full text rather than PDF files of its public domain content, as do Open Content Alliance and Making of America (and EAF, if you just download the HTML).  I had to convert Google’s PDF files to Adobe Tagged Text XML and got disappointing results.  The OCR quality for Open Content Alliance was better, but words were not joined across line breaks, reducing accuracy.  With multi-volume works, neither Open Content Alliance nor Google Books provided very good metadata.
  • To make it easier for researchers to discover relevant tools, I teamed up with 5 other librarians to launch the Digital Research Tools, or DiRT, wiki at the end of May.
  •  
    Review of digital humanities scholarship tools
1More

Web 2.0 Is the Future of Education (Techlearning blog) - 0 views

  •  
    Steve Hargadon writes: 'We've spent the last ten years teaching students how to protect themselves from inappropriate content - now we have to teach them to create appropriate content.'
11More

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
‹ Previous 21 - 40 of 111 Next › Last »
Showing 20 items per page