Skip to main content

Home/ educators/ Group items matching "Social-Software" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Maggie Verster

Study on the Effective Use of Social Software to Support Student Learning & Engagement - 0 views

  •  
    "Our investigations have shown that social software tools support a variety of ways of learning: sharing of resources (eg bookmarks, photographs), collaborative learning, problem-based and inquiry-based learning, reflective learning, and peer-to-peer learning. Students gain transferable skills of team working, online collaboration, negotiation, and communication, individual and group reflection, and managing digital identities."
Thomas Ho

Replaced By Machines: Will Efficient Social Software Take Your Job Away? - 0 views

  •  
    lots of "food for thought" With implications for education
Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Ruth Howard

Internet as Playground and Factory :: Intro - 6 views

  • Large corporations then profit from this interaction by collecting and selling this data.  Social participation is the oil of the digital economy. Today, communication is a mode of social production facilitated by new capitalist imperatives and it has become increasingly difficult to distinguish between play, consumption and production, life and work, labor and non-labor.  
  • The revenues of today's social aggregators are promising but their speculative value exceeds billions of dollars. Capital manages to expropriate value from the commons; labor goes beyond the factory, all of society is put to work. Every aspect of life drives the digital economy: sexual desire, boredom, friendship — and all becomes fodder for speculative profit.
  • Free Software and similar practices have provided important alternatives to and critiques of traditional modes of intellectual property to date but user agency is not just a question of content ownership. Users should demand data portability, the right to pack up and leave the walled gardens of institutionalized labor à la Facebook or StudiVZ. We should ask which rights users have beyond their roles as consumers and citizens.
  • ...2 more annotations...
  • How much should Google pay them to tag an image? Such payment could easily become more of an insult than a remuneration. Currently, there are few adequate definitions of labor that fit the complex, hybrid realities of the digital economy.
  • The Internet as Playground and Factory poses a series of questions about the conundrums surrounding labor (and often the labor of love) in relation to our digital present:
Clif Mims

SchooNoodle - 0 views

  •  
    FREE online social bookmarking community made exclusively for K-12 educators.
Dave Truss

Full Interview: Luis Suarez explains how to quit email | Spark | CBC Radio - 5 views

  •  
    Thoughtful podcast that really makes me question why social software has actually added to my email rather than decreased it, (with 'notices' etc.).
Anne Bubnic

Free Software/Web Tools - 0 views

  •  
    A collection of Web 2.0 tools with links - screened by CLRN (California Learning Resource Network) with appropriate grade levels. Includes blogs & wikis, bookmark/resource sharing, productivity, collaboration and social networking.
Jennifer Garcia

BuddyPress.org - WordPress Social Network Software → Demo - 7 views

  •  
    "BuddyPress Demo" alternative to ning
Deron Durflinger

Niall Ferguson: How American Civilization Can Avoid Collapse - The Daily Beast - 4 views

  • “killer applications
  • Competition
  • The Scientific Revolution
  • ...29 more annotations...
  • Modern Medicine
  • The Consumer Society
  • The Work Ethic
  • The Rule of Law and Representative Government.
  • these killer apps were essentially monopolized by Europeans and their cousins who settled in North America and Australasia
  • the great divergence
  • They also grew more powerful
  • 20th century, just a dozen Western empires—-including the United States—controlled 58 percent of the world’s land surface and population, and a staggering 74 percent of the global economy.
  • tendency of Western societies to delete their own killer apps.
  • But there is a second, more insidious cause of the “great reconvergence,” which I do deplore—and that is the
  • Ask yourself: who’s got the work ethic now? The average South Korean works about 39 percent more hours per week than the average American. The school year in South Korea is 220 days long, compared with 180 days here. And you don’t have to spend too long at any major U.S. university to know which students really drive themselves: the Asians and Asian-Americans
  • Yet life expectancy in the U.S. has risen from 70 to 78 in the past 50 years, compared with leaps from 68 to 83 in Japan and from 43 to 73 in China.
  • On no fewer than 15 of 16 different issues relating to property rights and governance, the United States fares worse than Hong Kong. Indeed, the U.S. makes the global top 20 in only one area: investor protection
  • The future belongs not to them but to today’s teenagers
  • The latest data on “mathematical literacy” reveal that the gap between the world leaders—the students of Shanghai and Singapore—and their American counterparts is now as big as the gap between U.S. kids and teenagers in Albania and Tunisia.
  • Yet statistics from the World Intellectual Property Organization show that already more patents originate in Japan than in the U.S., that South Korea overtook Germany to take third place in 2005, and that China is poised to overtake Germany too
  • the United States’ average competitiveness score has fallen from 5.82 to 5.43, one of the steepest declines among developed economies. China’s score, meanwhile, has leapt up from 4.29 to 4.90.
  • Perhaps more disturbing is the decline of meaningful competition at home, as the social mobility of the postwar era has given way to an extraordinary social polarization. You don’t have to be an Occupy Wall Street leftist to believe that the American super-rich elite—the 1 percent that collects 20 percent of the income—has become dangerously divorced from the rest of society, especially from the underclass at the bottom of the income distribution.
  • Far more than in Europe, most Americans remain instinctively loyal to the killer applications of Western ascendancy, from competition all the way through to the work ethic. They know the country has the right software. They just can’t understand why it’s running so damn slowly.
  • What we need to do is to delete the viruses that have crept into our system: the anticompetitive quasi monopolies that blight everything from banking to public education; the politically correct pseudosciences and soft subjects that deflect good students away from hard science; the lobbyists who subvert the rule of law for the sake of the special interests they represent—to say nothing of our crazily dysfunctional system of health care, our overleveraged personal finances, and our newfound unemployment ethic
  • And finally we need to reboot our whole system.
  • If what we are risking is not decline but downright collapse, then the time frame may be even tighter than one election cycle
  • Western Civilization's Killer Apps
  • COMPETITION
  • THE SCIENTIFIC REVOLUTION
  • THE RULE OF LAW
  • MODERN MEDICINE
  • THE CONSUMER SOCIETY
  • THE WORK ETHIC
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
David Wetzel

10 Online Programs Which Support Learning in Adult Education - 4 views

  •  
    Free online technologies are changing adult education by offering the ability to use free online tools to support collaboration and completing class work. The list is long in regards to the number of online programs which support adult students in their quest for learning in adult education. The sheer number of these online software programs continues to grow almost daily. A review of several of these programs has narrowed the list down to a few which are beneficial to adult students, because they ease their work load and collaboration efforts with fellow classmates.
Ed Webb

Peru's ambitious laptop program gets mixed grades - Yahoo! News - 0 views

  • what we did was deliver the computers without preparing the teachers
  • the missteps may have actually widened the gap between children able to benefit from the computers and those ill-equipped to do so
  • Inter-American Development Bank researchers were less polite."There is little solid evidence regarding the effectiveness of this program," they said in a study sharply critical of the overall OLPC initiative that was based on a 15-month study at 319 schools in small, rural Peruvian communities that got laptops."The magical thinking that mere technology is enough to spur change, to improve learning, is what this study categorically disproves," co-author Eugenio Severin of Chile told The Associated Press
  • ...10 more annotations...
  • OLPC laptops, which are rugged and energy efficient and run an open-source variant of the Linux operating system, are in Ethiopia, Rwanda, Mongolia and Haiti, and even in the United States and Australia. Uruguay, a compact South American nation of 3.5 million people, is the only country that has fully embraced the concept and given every elementary school child and teacher an XO laptop
  • no increased math or language skills, no improvement in classroom instruction quality, no boost in time spent on homework, no improvement in reading habits
  • On the positive side, the "dramatic increase in access to computers" accelerated by about six months students' abstract reasoning, verbal fluency and speed in processing information
  • "We knew from the start that it wouldn't be possible to improve the teachers," he said, citing a 2007 census of 180,000 Peruvian teachers that showed more than 90 percent lacked basic math skills while three in five could not read above sixth-grade level.
  • Each teacher was supposed to get 40 hours of OLPC training. That hardly helped in schools where teachers had never so much as booted up a computer. In Patzer's experience "most of them barely knew how to interact with the computers at all."
  • In the higher grades, Martinez said, children's use of the machines is mostly social
  • "For them, the laptop is more for playing than for learning,"
  • Negroponte thinks the main goal of technology educators should be simply getting computers into poor kids' hands.His proposal last year to parachute tablet computers from helicopters, limiting the involvement of adults and "educators," caused some colleagues to wince. But Negroponte is dead serious, and has begun a pilot project in two Ethiopian villages to test whether tablets alone, loaded with the right software, can teach children to read.
  • The OLPC team always considered Internet connectivity part of the recipe for success. They also insisted that each child be given a laptop and be permitted to take it home.Uruguay, a small, flat country with a far higher standard of living and ubiquitous Internet, has honored those requirementsPeru did not
  • Some schools didn't have enough electricity to power the machines.And then there was the Internet. Less than 1 percent of the schools studied had it.
Mike Sansone

Beth's Blog: How Nonprofits Can Use Social Media: Information Coping Skills: Turn Off the Damn Email Software and Get Some Work Done (Or go for a walk)! - 0 views

  •  
    Don't miss the self-assessment and reflection link.
Clif Mims

Posterous - 0 views

  •  
    The place to post everything. Just email us. Dead simple blog by email.
1 - 20 of 24 Next ›
Showing 20 items per page