Skip to main content

Home/ elearning 2.0/ Group items tagged 1%rule

Rss Feed Group items tagged

Alexis Krysten

ICT in my Classroom - 1 views

    • Twitter

    • What people are saying...

    • RSS Class del.icio.us

    • RSS My del.icio.us

    • Stats

    • Where are you?

    • Live Traffic

      Live traffic feed
        Merchantville, New Jersey arrived from groups.diigo.com on "ICT in my Classroom"
        Bend, Oregon arrived from betwittered.com on "What my class thought of our Google Docs project | ICT in my Classroom"
        Mountain View, California arrived on "ICT in my Classroom"
      Graham Atttwell

      Knowledge-at-work: Boundary objects and KM - 5 views

      •  
        " Boundary object (BO), originally introduced by Starr (1989), is a concept to refer to objects that serve an interface between different communities of practice. Boundary objects are an entity shared by several different communities but viewed or used differently by each of them. As Star points out, boundary objects in an organization work because they necessarily contain sufficient detail to be understandable by both parties, however, neither party is required to understand the full context of use by the other - boundary objects serve as point of mediation and negotiation around intent. Boundary objects are flexible enough to adapt to local needs and have different distinct identities in different communities, but at the same time robust enough to maintain a common identity across the boundaries to be a place for shared work. Boundary objects are not necessarily physical artifacts such as a map between two people: they can be a set of information, conversations, interests, rules, plans, contracts, or even persons. It is around BOs that Communities of Practice (CoPs) often gather. BOs are 'used' by members of different communities in very different ways, although the representation is shared. BOs are an important class of knowledge artifacts. They are center stage in the dynamics of knowledge exchange. BOs are also known as CISs (common information spaces). Examples: Reports are a classic example of traces as boundary objects that the professionals and other members share. Faxed documents and email massages are also the boundary object among distributed members. Information spaces, where particpants gather to exchange information, co-ordinate activites and create knowledge are another example of BOs A library catalog, an order entry process, travel assistance request form, an organizational knowledge map, i.e. one of the products from your knowledge mapping project! Mapping BOs: Boundary objects are a very useful way to structure and
      Antwak Short videos

      Top 10 Podcasts for Cybersecurity in 2021 - 0 views

      •  
        Cybersecurity is an area that is new and exciting. People like to know how to be safe from cyber attacks to digital terrorism. It can at first seem daunting to dive into the field of cybersecurity because it is a complex topic. However, with technology being a greater part of everyday life, it is a must to know about cyber risks. Cybersecurity podcasts have been a useful tool for years to absorb security content, keep updated with the recent risks, hear about current events, and everything else you need to know in order to stay at the top of your game. If you work in technology or are only starting to learn about the field, these are the best podcasts on the topic of cybersecurity. There are several great podcasters lauding from the security field, delivering decades of experience, fresh experiences, and useful knowledge to listeners around the globe. We have discovered 10 podcasts full of engaging conversations, interviews, and resources on recent trends and events. These podcasts are great at keeping up on the news, gathering valuable advice, not to forget that they are fun to listen to, from the newest security technologies to the emergence of new malware. Here goes the list of top 10 podcasts in cybersecurity in 2021. 1. Darknet Diaries: Host: Jack Rhysider Date of podcast launch: September 2017 Three typical topics: ATM hacking, the history of carding, Stuxnet Available on: RSS, YouTube, Spotify, iTunes, Google, Overcast, Stitcher and others Average episode length: 60 minutes, bi-weekly Website: darknetdiaries.com Darkest Diaries is undoubtedly amongst one of the most fascinating and interesting podcasts. Something that should be on the top of your watchlist. This investigatory podcast digs deeper into actual tales about cybercrime, malware, and everything else on the internet that is suspicious. Darknet Diaries provides extensive review for those who are pragmatic about the data breaches faced to today's people and corporations, featuring "true stories f
      Nigel Coutts

      Rethinking Mathematics Education - The Learner's Way - 0 views

      •  
        What becomes clear, as you dive further into the emerging research that connects what we know about learning, mindsets, dispositions for learning and the development of mathematical understandings, is that a new approach is required. We need to move away from memorisation and rule based simplifications of mathematics and embrace a model of learning that is challenging and exciting. We can and should be emerging all our students in the beauty and power of mathematics in learning environments full of multiple representations, rich dialogue and collaborative learning. 
      Robin Dale

      Why My One Year Facebook Account Got Disabled - 1 views

      •  
        Why my 1 year old facebook account got permanently disabled? I have always been sticked to their rules and regulations, then why does it happen? While improving my network and adding new friends, only one time I got a message. As I have heard that upon the warning it just ban your account for a while.
      Nergiz Kern

      "90-9-1" Rule for Participation Inequality: Lurkers vs. Contributors in Internet Commun... - 13 views

      •  
        Participation Inequality: Encouraging More Users to Contribute
      Leo de Carvalho

      eLearn: Feature Article - Learning 2.0: How digital networks are changing the rules - 0 views

      • Clay Shirky, author of Cognitive Surplus: Creativity and Generosity in a Connected Age, eminds us: "In the history of print, we got erotic novels 100 years before we got scientific journals, and complaints about distraction have been rampant; no less a beneficiary of the printing press than Martin Luther complained, 'The multitude of books is a great evil. There is no measure of limit to this fever for writing.'"
      • Thus whether we are simply in a transition stage with the Internet in which we will eventually weed out the more frivolous content (or at least find a proper place for it) is left to be seen, but history would indicate that there is a distinct possibility that we will self-regulate for the better good.
      • Gardner also contends that creativity can be cultivated in groups. Thus the ability to work collaboratively may palliate a lack of individual creativity.
      • ...5 more annotations...
      • "creating mind."
      • "synthesizing mind".
      • conceptual connections
      • respectful mind.
      • ethical mind
      •  
        Is enough to learn in the meta level? Simply learning how you can use the Internet to learn about the Renaissance is not enough, we must learn to paint a Sistine Chapel of our own.
      1 - 8 of 8
      Showing 20 items per page