Skip to main content

Home/ educators/ Group items matching "photographs" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
yc c

Images from the History of Medicine (IHM) - 10 views

  •  
    The Image database, Images from the History of Medicine (IHM), is an online picture database of nearly 70,000 images from the National Library of Medicine (NLM) History of Medicine Division's Prints and Photographs Collection. IHM includes portraits, Photographs, caricatures, genre scenes, posters, and graphic art illustrating the social and historical aspects of medicine dated from the 15th to 21st century.\nThe collection includes portraits, Photographs, caricatures, genre scenes, posters, and graphic art illustrating the social and historical aspects of medicine dated from the 15th to 21st century.The collection includes portraits, Photographs, caricatures, genre scenes, posters, and graphic art illustrating the social and historical aspects of medicine dated from the 15th to 21st century.The purpose of the IHM database is to assist users in finding and viewing visual material for private study, scholarship, and research. This site contains some materials that may be protected by United States or foreign copyright laws. It is the users' responsibility to determine compliance with the law when reproducing, transmitting, or distributing images found in IHM.
Jennifer Garcia

Calendar: Create monthly calendars from your photographs. - 23 views

  •  
    "Calendar: Create monthly calendars from your photographs."
Dave Truss

Rare Book Room - 0 views

  •  
    The "Rare Book Room" site has been constructed as an educational site intended to allow the visitor to examine and read some of the great books of the world. Over the last decade, a company called "Octavo" digitally photographed some of the world 's great books from some of the greatest libraries. These books were photographed at very high resolution (in some cases at over 200 megabytes per page).
Fred Delventhal

Public Domain Clipart optimized for word processors - 0 views

  • WPClipart is a collection of high-quality public domain images specifically tailored for use in word processors and optimized for printing on home/small office inkjet printers. There are thousands of color graphic clips as well as illustrations, photographs and black and white line art. Nearly all are in lossless, PNG format. As of Friday, 12/12/2008 there are 23,907 images.
  •  
    WPClipart is a collection of high-quality public domain images specifically tailored for use in word processors and optimized for printing on home/small office inkjet printers. There are thousands of color graphic clips as well as illustrations, photographs and black and white line art. Nearly all are in lossless, PNG format. As of Friday, 12/12/2008 there are 23,907 images.
Ben Rimes

Psykopaint - Create and paint amazing art from photos - 0 views

  •  
    manupulate images sample using paints
  •  
    Upload pictures or start from scratch and "paint" in the style of a famous artist. A fun way to spruce up your images, but also an interesting way for art educators to let students explore different styles using digital photographs.
David Hilton

Collection and Subject Area Overviews (Prints and Photographs Reading Room, Library of Congress) - 6 views

  •  
    A large set of collections focussing mainly on US history, however also containing primary images from other regions of the world. Mainly photographs.
Roland O'Daniel

MSP:MiddleSchoolPortal/Teaching With Trade Books - NSDLWiki - 5 views

  •  
    ...benefits of using trade books is increasing student engagement. High quality trade books are written as to spark interest and create a desire to read. Many contain colorful, interesting illustrations, photographs, and diagrams, all of which draw students into the text and improve comprehension.
Maggie Verster

Study on the Effective Use of Social Software to Support Student Learning & Engagement - 0 views

  •  
    "Our investigations have shown that social software tools support a variety of ways of learning: sharing of resources (eg bookmarks, photographs), collaborative learning, problem-based and inquiry-based learning, reflective learning, and peer-to-peer learning. Students gain transferable skills of team working, online collaboration, negotiation, and communication, individual and group reflection, and managing digital identities."
Gary Bertoia

How to Embed Almost Anything in your Website - 0 views

  •  
    Learn how to embed almost anything in your HTML web pages from Flash videos to Spreadsheets to high resolution photographs to static images from Google Maps and more.
Vicki Davis

A Difference: How Flickr Threw a Switch In My Head - 0 views

  •  
    I love this post by Darren Kuropatwa who talks about the transformation many, including himself, experience from just taking a photograph a day of their own person and surroundings. I find this fascinating and the links are great. This is a very rich post and insight into the types of things that cause change. To me, reflecting on my blog is sort of an internal snapshot of my thinking at the moment and has been fundamental to my own transformation. Sometimes when we observe ourselves from a distance, we are able to make changes right up under our nose.
  •  
    Transformation with pictures.
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
Vicki Davis

FOXNews.com - Trading Nude Photos Via Mobile Phone Now Part of Teen Dating, Experts Say - Science News | Science & Technology | Technology News - 0 views

  • The instant text, picture and video messages have become part of some teens' courtship behavior, police and school officials said.
  • "I've seen everything from your basic striptease to sexual acts being performed," said Reynoldsburg police Detective Brian Marvin, a member of the FBI Cyber Crime Task Force of Central Ohio. "You name it, they will do it at their home under this perceived anonymity."
  • "This happens a lot," said Kelsey, author of Generation MySpace: Helping Your Teen Survive Online Adolescence. "It crosses every racial socio-economic group. Christian kids are doing it. Jewish kids are doing it." Male teens are also doing it.
  • ...1 more annotation...
  • A study last year found teens are placing more of an emphasis on image and fame than in the past. Jean Twenge, a psychology professor at San Diego State University who studies young people's trends, found that teens are more confident and assertive than ever before.
  •  
    Teens are really moving a lot of their relationships to cell phones as Danah Boyd said recently on a Wow2 show. This example of teenage habits of sharing photographs on cell phones is an example. Discussions of cell phone use should be a part of what parents and teachers do with kids. This makes me think twice about allowing cell phone cameras on my children's phones, but I'd rather help them be wise in using it.
Vicki Davis

From the Annointed Few to the Collective Many - 0 views

    • Vicki Davis
       
      How sad!
  • the Internet has morphed from a presentation medium to an interactive platform in just a few years
  • a leading web analysis site
    • Vicki Davis
       
      I find this description of Technorati almost amusing.
  • ...18 more annotations...
  • more than 50 percent of Americans aged 20-30 years old use Facebook
  • among Americans under the age of 35, social networking and user-generated content sites have overtaken TV as a primary media.
  • “Visitors to MySpace.com and Friendster.com generally skew older, with people age 25 and older comprising 68 and 71 percent of their user bases, respectively.”
  • We’re in the midst of a paradigm shift where individuals are indeed connecting “in ways and at levels that [they] haven’t done before”
  • Workplace communities
  • orkplace communities are designed to solve workplace-related challenges
  • talent management is about finding, developing, and retaining key talent within the organization
  • Ernst & Young, for instance, has a significant presence on Facebook in support of its recruiting efforts
  • Google, Home Depot, Enterprise Rent a Car, and Deloitte also are recruiting using Web 2.0 tools through YouTube videos and even alumni social networks
  • “If companies keep social networks out, they will be doing a significant disservice to their bottom lines
    • Vicki Davis
       
      Understanding networks is important to students. Knowing how to be professional and what is appropriate for different spaces is vital.
  • Between 2000 and 2020, 75 million Boomers will reach retirement age.
  • The only content service with mass adoption (greater than 50 percent) was Social Networking, and this was only among respondents under the age of 35.”
  • In addition, Millennials are the first generation to spend more hours online per week than watching TV (16.7 vs 13.6).
  • some of the characteristics of Millenials, which included a desire to work in  “[open] and flat organizations” as “part of a tribe.”
  • “heavy use of technology (messaging, collaboration, online learning) as a daily part of their work lives.”
  • robust and active communities will have an easier time recruiting talented Millennials
  • they have opportunities to meaningfully connect to their peers and supervisors.
  • A retiring Boomer who is an expert in a particular field could be an excellent community manager, blogger, or wiki contributor.
    • Vicki Davis
       
      Blogging might be the answer for retiring boomers?
  •  
    Business people and management should read this article about the transformation of business by using workplace communities. "Workplace communities are designed to solve workplace-related challenges" -- they focus on tasks. I would find it interesting to see a business REALLY use technology to change things. Having the business in a business network (OK a NING) and let people tag their posts with the business related PROBLEMS they are having and blog, video, or photograph it-- the tag cloud would tell the business IMMEDIATELY what the problems are in the company. The problem with this model is that there are few corporate executives who REALLY want to know the problems within their organizations. They don't want to be problem solvers, just opportunity creators. However, when managers open their eyes (and I'm a former General Manager myself) and see that two things give business opportunity: problem solving and innovation. And they are directly related. True innovation solves problems. Read this article and think about how you may solve problems using the networks you may now create. If you don't want everyone to know, keep it private and only allow people in your company in.
Dennis Richards

Have-A-Cow Educational Program - 0 views

  •  
    Hundreds of thousands of people have participated in this educational program since it began in 1989. Participants receive a photograph of a real cow that produces milk for Stonyfield Farm, her biography that tells about life on the farm and seasonal updates from "their" cow. By exposing people to life on a modern day farm and some of the problems farmers face, we hope to cultivate an appreciation for healthy soil and a healthy planet - the ultimate source of our sustenance.
Vicki Davis

Photo 113 on Flickr - Photo Sharing! - 0 views

  •  
    One of my favorite web 2.0 tools shown last year at necc wasn't on a computer, it was a keychain used by Kevin Honeycutt. These are amazing and this is a photograph of that. These were given to the teacher at his school in sort of a swap meet - people wrote about what it was and links on one side and the name on the other side along with the name of a person who could be contacted to help with that. Each teacher had to bring two to share with the others.
Ted Sakshaug

Western States Black Research and Educational Center - 0 views

  •  
    The Mayme A. Clayton Library & Museum (MCLM) maintains the largest and most academically substantial, independently held collection of rare and out-of-print books, documents, films, music, photographs and memorabilia on African American history and culture in the United States.   MCLM's primary goal is to make the collection available to the public as a cultural compass to a more complete view of American history. 
yc c

Museum of London - Street Museum - 1 views

  •  
    Streetmuseum is a new (and free) augmented reality iPhone app created by the Museum of London that allows you to browse historical photographs in various parts of the city.
Melinda Waffle

Finding and using public domain photographs - 16 views

  •  
    Images in the public domain
Claude Almansi

Belgian Newspapers v. Google: Text of the Court of Appeal's Decision « Educational Technology and Change Journal - 0 views

  •  
    "Posted on August 1, 2011 by Claude Almansi In 2006, Copiepresse, the rights managing society of Belgian publishers of French- and German-language daily newspapers, sued Google about the snippets shown in Google News and about the cached versions displayed in Google Search. On May 5, 2011, a decision of the Brussels appeal court slightly reworded but basically confirmed the 2007 judgment of the first instance court : (...) This decision of the Brussels Court of Appeals is therefore important for legal studies: not only because of the doubt about what it actually ordered, but also because its long and detailed initial considerations illustrate several differences between the US and European legal cultures. Until recently, this decision was only available as a photographic PDF on Scribd. This meant that it was inaccessible to blind people and awkward to study for everybody. Fortunately, the BJ Institute of Hyderabad, India, has now made it available as accessible PDF and DOC files. This is the version I used for the above quotation. Thanks to the collaborators of the BJ Institute for their very accurate work."
Jeff Johnson

Ten Common Copyright Permission Myths (Copyright Clearance: Fair Use, Copyright Notice, Getting Permission, Locating Copyright Owners, Public Domain) - 0 views

  •  
    Although the First Amendment may appear unconditional on its face, the right to speak and write freely has never been absolute. Intellectual property rights often prevail over an author's "creative license." The main benefit of copyright, for example, is the right to exclude others from making copies of a work (or any part of it) without permission. By protecting an author's expression, copyright guarantees that authors and other creators, derive financial benefits from their work. If you intend to use someone's copyrighted work, unless the use is considered a "fair use" (which is technically a defense to copyright infringement), you must obtain that person's written permission. Under federal law, only the copyright owner or someone acting with the owner's authority, such as a publisher, can grant that permission. Without written permission, you expose yourself to legal risks. While not every unauthorized use of a copyrighted work is an infringement, whenever you include another person's words, illustrations, photographs, charts or graphs in a work you publish, you must be sensitive to the risk of infringing someone's copyright. What follows are some common copyright permission myths.
1 - 20 of 42 Next › Last »
Showing 20 items per page