Skip to main content

Home/ Groups/ educators
Jeff Johnson

Myths About Learning (SMR Blog) - 0 views

  •  
    Researchers at the University of Tennessee list out several myths about learning. The premise that everyone starts with the same base of knowledge about a particular subject, everyone learns at the same pace, everyone learns best by listening, everyone will bridge naturally from theory to application, everyone should learn on his or her own rather than in collaboration and learning is the transfer of knowledge from a teacher to a passive learner results in excessive telling or lecture. "We don't remember information totally; we reconstruct the way information connects to [other] information,"…"That means learners have to reconstruct the interconnectors or forget what they've learned in a short time. The stuff you remember is what you use to make the interconnections."

    FUN can play a great role in making the interconnections or associations.
Emily Vickery

Edutopia - 0 views

shared by Emily Vickery on 20 Aug 08 - Cached
  • Cosand became a Twitterer about a year ago, and he now considers Twitter one of his best sources of real-time professional development. "I'm able to get information and find opportunities I wouldn't have been able to gather on my own," he says.
Dean Mantz

BBC NEWS | Technology | US to back 21st century learning - 0 views

  •  
    The US Congress has given the go-ahead for a new centre to explore ways advanced computer and communications technologies can improve learning.
Eloise Pasteur

Free Digital Texts Begin to Challenge Costly College Textbooks in California ~ Stephen'... - 0 views

  • Free Digital Texts Begin to Challenge Costly College Textbooks in California

    Expect to see more of this. Not only the writing and releasing of free textbooks. But also the attempts by publishers to lure their authors back into the commercial fold. They'll have to change their price points, though. As Tom Hoffman says, "he point is that there are lots of actors other than publishers who can pay a professor to write a text and release it under a free license, and $100,000 is not a lot of money to a state, country, large university or foundation."

Vicki Davis

Going Google: Talking with Google Certified teacher Erica Hartman - NJ.com: Jersey Blogs - 0 views

  •  
    It is exciting to see The Star-Ledger Write about Google Certified Teacher, Erica Hartman. Erica does a marvelous job in this interview.
  •  
    Interview with Google Certified Teacher, Erica Hartman
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this.

    A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft.

    Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.

  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it."

    A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields.

    But passwords protect information from a frontal assault by way of the computer's keyboard.

  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything.

    Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries.

    Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.

  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dave Truss

Langwitches » What Makes the WhiteBoard Interactive ? - 0 views

  • The more I am playing and experimenting with the SmartBoard and the software Notebook 10, the more I am convinced that the power is IN THE SOFTWARE.  But not the software itself, but how it is used as a tool to present the lesson in a new way, for a different learning style, for access outside of the classroom.
  •  
    I am convinced that the power is IN THE SOFTWARE. But not the software itself, but how it is used as a tool to present the lesson in a new way, for a different learning style, for access outside of the classroom.
Dave Truss

Think Different at Students 2.0 - 0 views

  •  
    Think of the wealth of talent that is being and has been squandered due to this system. How many people would have become the next great composer if they had been given just that little bit more leeway?
Dave Truss

Get Smart- Interactive Activities - 0 views

  •  
    Please note that these pages contain a collection of links to suitable activities to support and enhance classroom teaching and learning.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III.

    • Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001).

    • Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984).

    • When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).

  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • ...2 more annotations...
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Zaid Ali Alsagoff

101 Free Learning Tools - 142 views

Dear All, I have updated my list of free learning tools, and made it more visual: "Let's explore the idea that there is at least one excellent free learning tool (or site) for every learning prob...

learning teaching thinking tools

started by Zaid Ali Alsagoff on 18 Aug 08 no follow-up yet
Vicki Davis

TweetDeck - 0 views

  •  
    Neat program for twitter users.
  •  
    Cool application for twitter.
  •  
    Cool application for twitter that makes it easier to use. I really like it! It is another adobe air application which means you can use if offline too!
Vicki Davis

» An Open Letter to Teachers Bud the Teacher - 0 views

  •  
    Great reminder to educators about teaching.
  •  
    Bud's open letter to teachers is phenomenal and real. It is a great reminder for those getting started in the school year! Wow!
« First ‹ Previous 12261 - 12280 of 13941 Next › Last »
Showing 20 items per page