Skip to main content

Home/ educators/ Group items matching "Networking" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Evaluate VMware Infrastructure 3 (VI3) Free for 60 Days - VMware - 0 views

  •  
    Fascinating way to create virtual servers.
  •  
    This software lets you take one host PC server and this lets you virtualize servers. In Walton County - have 100 servers and 60 are virtual. All independent and have their own IP address and appear completely independent -- they have 6 blade servers. This does cost money. This would let me move the Accelerated Reader and Accounting system to separate "virtual servers" and if one needed to reboot, I could reboot a "virtual server" and not the physical server. This is from an expert IT - Jack Higgins, Network Analyst - Walton County schools in Atlanta, GA -- met by accident in the Atlanta airport. A lot of these bookmarks are from him!
1More

Digital Biographer™ » One in ten US College Admissions Officers checks social... - 0 views

  • college kids don’t have to worry too much about what material they place on Facebook or MySpace (yet) but they should certainly throw together a profile on a college admissions profile site to boost their chances of admission to their preferred schools
18More

World Without Walls: Learning Well with Others | Edutopia - 0 views

  • We must also expand our ability to think critically about the deluge of information now being produced by millions of amateur authors without traditional editors and researchers as gatekeepers. In fact, we need to rely on trusted members of our personal networks to help sift through the sea of stuff, locating and sharing with us the most relevant, interesting, useful bits. And we have to work together to organize it all, as long-held taxonomies of knowledge give way to a highly personalized information environment.
    • Jeff Richardson
       
      Good reason for teaching dig citizenship
    • Terry Elliott
       
      What Will suggests here is rising complexity, but for this to succeed we don't need to fight our genetic heritage. Put yourself on the Serengeti plains, a hunter-gatherer searching for food. You are thinking critically about a deluge of data coming through your senses (modern folk discount this idea, but any time in jobs that require observation in the 'wild' (farming comes to mind) will disabuse you rather quickly that the natural world is providing a clear channel.) You are not only relying upon your own 'amateur' abilities but those of your family and extended family to filter the noise of the world to get to the signal. This tribe is the original collaborative model and if we do not try to push too hard against this still controlling 'mean gene' then we will as a matter of course become a nation of collaborative learning tribes.
  • Collaboration in these times requires our students to be able to seek out and connect with learning partners, in the process perhaps navigating cultures, time zones, and technologies. It requires that they have a vetting process for those they come into contact with: Who is this person? What are her passions? What are her credentials? What can I learn from her?
    • Terry Elliott
       
      Aye, aye, captain. This is the classic problem of identity and authenticity. Can I trust this person on all the levels that are important for this particular collaboration? A hidden assumption here is that students have a passion themselves to learn something from these learning partners. What will be doing in this collaboration nation to value the ebb and flow of these learners' interests? How will we handle the idiosyncratic needs of the child who one moment wants to be J.K.Rowling and the next Madonna. Or both? What are the unintended consequences of creating an truly collaborative nation? Do we know? Would this be a 'worse' world for the corporations who seek our dollars and our workers? Probably. It might subvert the corporation while at the same moment create a new body of corporate cooperation. Isn't it pretty to think so.
  • Likewise, we must make sure that others can locate and vet us.
  • ...9 more annotations...
  • technical know-how is not enough. We must also be adept at negotiating, planning, and nurturing the conversation with others we may know little about -- not to mention maintaining a healthy balance between our face-to-face and virtual lives (another dance for which kids sorely need coaching).
    • Terry Elliott
       
      All of these skills are technical know how. We differentiate between hard and soft skills when we should be showing how they are all of a piece. I am so far from being an adequate coach on all of these matters it appalls me. I feel like the teacher who is one day ahead of his students and fears any question that skips ahead to chapters I have not read yet.
  • The Collaboration Age comes with challenges that often cause concern and fear. How do we manage our digital footprints, or our identities, in a world where we are a Google search away from both partners and predators? What are the ethics of co-creation when the nuances of copyright and intellectual property become grayer each day? When connecting and publishing are so easy, and so much of what we see is amateurish and inane, how do we ensure that what we create with others is of high quality?
    • Terry Elliott
       
      Partners and predators? OK, let's not in any way go down this road. This is the road our mainstream media has trod to our great disadvantage as citizens. These are not co-equal. Human brains are not naturally probablistic computer. We read about a single instance of internet predation and we equate it with all the instances of non-predation. We all have zero tolerance policies against guns in the school, yet our chances of being injured by those guns are fewer than a lightning strike. We cannot ever have this collaborative universe if we insist on a zero probability of predation. That is why, for good and ill, schools will never cross that frontier. It is in our genes. "Better safe than sorry" vs. "Risks may be our safeties in disguise."
  • Students are growing networks without us, writing Harry Potter narratives together at FanFiction.net, or trading skateboarding videos on YouTube. At school, we disconnect them not only from the technology but also from their passion and those who share it.
  • The complexities of editing information online cannot be sequestered and taught in a six-week unit. This has to be the way we do our work each day.
  • The process of collaboration begins with our willingness to share our work and our passions publicly -- a frontier that traditional schools have rarely crossed.
  • Look no further than Wikipedia to see the potential; say what you will of its veracity, no one can deny that it represents the incredible potential of working with others online for a common purpose.
  • The technologies we block in their classrooms flourish in their bedrooms
  • Anyone with a passion for something can connect to others with that same passion -- and begin to co-create and colearn the same way many of our students already do.
  • I believe that is what educators must do now. We must engage with these new technologies and their potential to expand our own understanding and methods in this vastly different landscape. We must know for ourselves how to create, grow, and navigate these collaborative spaces in safe, effective, and ethical ways. And we must be able to model those shifts for our students and counsel them effectively when they run across problems with these tools.
  •  
    Article by Wil Richardson on Collaboration
10More

Doing Digital Scholarship: Presentation at Digital Humanities 2008 « Digital ... - 0 views

  • My session, which explored the meaning and significance of “digital humanities,” also featured rich, engaging presentations by Edward Vanhoutte on the history of humanities computing and John Walsh on comparing alchemy and digital humanities.
  • I wondered: What is digital scholarship, anyway?  What does it take to produce digital scholarship? What kind of digital resources and tools are available to support it? To what extent do these resources and tools enable us to do research more productively and creatively? What new questions do these tools and resources enable us to ask? What’s challenging about producing digital scholarship? What happens when scholars share research openly through blogs, institutional repositories, & other means?
  • I decided to investigate these questions by remixing my 2002 dissertation as a work of digital scholarship.  Now I’ll acknowledge that my study is not exactly scientific—there is a rather subjective sample of one.  However, I figured, somewhat pragmatically, that the best way for me to understand what digital scholars face was to do the work myself. 
  • ...6 more annotations...
  • The ACLS Commission on Cyberinfrastructure’s report points to five manifestations of digital scholarship: collection building, tools to support collection building, tools to support analysis, using tools and collections to produce “new intellectual products,” and authoring tools. 
  • Tara McPherson, the editor of Vectors, offered her own “Typology of Digital Humanities”: •    The Computing Humanities: focused on building tools, infrastructure, standards and collections, e.g. The Blake Archive •    The Blogging Humanities: networked, peer-to-peer, e.g. crooked timber •    The Multimodal Humanities: “bring together databases, scholarly tools, networked writing, and peer-to-peer commentary while also leveraging the potential of the visual and aural media that so dominate contemporary life,” e.g. Vectors
  • My initial diagram of digital scholarship pictured single-headed arrows linking different approaches to digital scholarship; my revised diagram looks more like spaghetti, with arrows going all over the place.  Theories inform collection building; the process of blogging helps to shape an argument; how a scholar wants to communicate an idea influences what tools are selected and how they are used.
  • I looked at 5 categories: archival resources as well as primary and secondary books and journals.   I found that with the exception of archival materials, over 90% of the materials I cited in my bibliography are in a digital format.  However, only about 83% of primary resources and 37% of the secondary materials are available as full text.  If you want to do use text analysis tools on 19th century American novels or 20th century articles from major humanities journals, you’re in luck, but the other stuff is trickier because of copyright constraints.
  • I found that there were some scanning errors with Google Books, but not as many as I expected. I wished that Google Books provided full text rather than PDF files of its public domain content, as do Open Content Alliance and Making of America (and EAF, if you just download the HTML).  I had to convert Google’s PDF files to Adobe Tagged Text XML and got disappointing results.  The OCR quality for Open Content Alliance was better, but words were not joined across line breaks, reducing accuracy.  With multi-volume works, neither Open Content Alliance nor Google Books provided very good metadata.
  • To make it easier for researchers to discover relevant tools, I teamed up with 5 other librarians to launch the Digital Research Tools, or DiRT, wiki at the end of May.
  •  
    Review of digital humanities scholarship tools
1More

Institute of Cognitive Neuroscience - 0 views

  •  
    Prof Brian Butterworth FBA Department Institute of Cognitive Neuroscience & Dept. Psychology Institution University College London Address Alexandra House, 17 Queen Square, London, WC1N 3AR Telephone 020-7679-1150 Home Page Email Current Research and Interests Cognitive psychology and neuropsychology of numbers and arithmetic. Neural network models of reading and arithmetic. Reading and acquired dyslexia in English, Japanese and Chinese.
1More

URLshrinker - 0 views

shared by Jason Heiser on 08 Sep 08 - Cached
  •  
    Cool site that takes a long URL and makes it smaller and more manageable for weblinks or social networks
1More

Northern Colorado Business Report - Business News Focused on Northern Colorado - 0 views

  •  
    This announcement came in recently: "The University of Northern Colorado is about to launch the Education Innovation Institute. University and government officials will detail plans on Sept. 24 for what is being billed as the "leading authority on education policy research and analysis." UNC has been a leader in the field of education since its founding in 1889 as the State Normal School." I hope that they will blog it, for if they truly want to influence educational innovation, they will share their findings and become part of this amazing grassroots network of educators. Be part of change or be irrelevant.
1More

UDL4All - 0 views

  •  
    A ning network where you can collaborate with other educators using Universal Design for Learning tools in their classrooms to improve teaching and learning.
2More

» The fallacy of community - Marketing Conversation - New Marketing and Socia... - 0 views

  •  
    Jonathan Trenn writes an article on the "fallacy of community" that many of the vendors at NECC should read. Edubloggers / educators/ educational groups of people emerge because we want to. We create a community when we need to and have the passionate desire for a common purpose. However, the word community and social network was so overused at NECC this year as to become a curse word. Used by people told it was important but who may not understand it themselves. This is a great article and strikes a cord with me.
  •  
    An articlea bout the fallacy of community.
3More

Building your pLN has never been easier - 0 views

  • This website is designed to show you how to use widgets / gadgets / plugins in your work to get access to information quickly and effectively.
  •  
    Building a PLN has just gotten easier.
  •  
    Organizations are starting to get things together to create widgets to help academicians, authors, and others to build a very powerful PLN (personal learning network) with their igoogle or netvibes. They seem to prefer Netvibes for a couple of reasons - and I maintain an account on both, although I startup on igoogle. There are Bespoke repository service widgets and repository information widgets. They even have a page to see what these widgets do (also in this post.) Every modern student (and professor and teacher) should understand how to build a PLN.
57More

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
1More

Developing an Acceptable Use Policy - 0 views

  •  
    This site is intended to assist K-12 school districts and other K-12 entities in developing their own Acceptable Use Policy for use of the K-20 Network. Since "local control" is a major tenet of K-12 education in Washington state, it is up to each district to determine what elements they wish to include in their own policy, and if they wish to include other elements not contained in the template that has been provided. It is highly recommended that all K-12 entities using the K-20 Network should have their own board-approved Acceptable Use Policy, in addition to the basic "K-20 Conditions of Use/Acceptable Use Policy" (see link below). Since it forms the basis of ALL that we do in K-12 education, we have included the K-12 Mission [restated from the OSPI Home Page] below as a reference point, and suggest you may want to include it and/or your district's mission statement with your AUP.
1More

U Tech Tips » Blog Archive » Where are the comments? - 0 views

  •  
    The conversation that has been going on around Twitter both here and here has lead to other e-mails and discussions around building networks and specifically how do you get people to comment on your blog? The problem is….you can't make people comment. What you can do is write compelling blog posts that make people want to leave comments. How do you do that….I'm not sure.
1More

School AUP 2.0 | Main / HomePage browse - 0 views

  •  
    Welcome to School AUP 2.0 This is a dynamic document designed to support teachers, school media specialists, and education leaders in developing, maintaining, and enforcing policies designed to: 1. Promote the most effective, productive, and instructionally sound uses of digital, networked, and abundant information environments. 2. Provide safe digital environments for learners and to instill safe practices and habits among the learning community. This wiki site will serve as a launchpad to other documents and communities seeking to provide guidance in acceptable use policy development and also as an incubator for ideas related to issues, document structures, new problems and opportunities, and maintenance.
2More

CSTA National Secondary School Comparison of 2007 and 2005 Results - 0 views

  •  
    Current comparisons of computer science and introductory computer science courses from the Computer Science teachers Association. I find it interesting that only 33% of schools require such a course and that the #2 choice for professional development for Computer Science teachers is now online networking.
  •  
    Interesting results comparing the last two years of computer science teachers association surveys.
2More

Tapped In Festival 2008: Beyond conflict -- Building Peaceful Communities - 0 views

  •  
    Information about the tapped in festival.
  •  
    Tapped in has been a mainstay in education and a non threatening method of using chat to link with people around the world. This longstanding contributor to education has its 2008 Tapped In Festival scheduled for July 23 and July 24th with some neat things planned. This website has more information for you and certificates of participation will be available for those who participates. Teachers should connect in which ever way they feel most comfortable and the power of embedded networks should never be ignored.
« First ‹ Previous 181 - 200 of 484 Next › Last »
Showing 20 items per page