Skip to main content

Home/ elearning 2.0/ Group items tagged Critical

Rss Feed Group items tagged

John Onwuegbu

Special Report: Making the Case for Windows 8.1 | Questechie - 3 views

  •  
    Albeit, Windows 8.1 was criticized for not addressing all Windows 8 problems, despite improvements to user experience.
Graham Atttwell

XWiki - Cases - WebHome - 0 views

  •  
    Digital identities Case Studies describe critical incidents of practice, highlighting key design challenges and possible solutions.
Graham Atttwell

Critical and Vygotskian theories of education: a comparison - 15 views

  •  
    Fascinating paper by Willem L. Wardekkercomparing different theories of education
Leo de Carvalho

eLearn: Case Studies - Group Discussion in Online Statistics Courses - 0 views

  • However, one main advantage about using discussion groups in the online environment is that the instructor can witness the full evolution of a group's discussion.
    • Leo de Carvalho
       
      uma das vantagens de grupos de discussao é que o instrutor fica consciente de toda a evolucao da discussao do grupo.
  •  
    In this article, Michelle Everson summarized her attempt to use small-group discussion assignments in an online introductory statistics course. She have found that these assignments can be successful, and they can lead to opportunities for students to reason more about statistical concepts and help each other learn important course material. When using such assignments, we would encourage instructors to (1) create assignments that do not have just one "right" answer so that students have ample opportunities to discuss different ideas and respond to what their group members post, (2) allow several days for students to work on the assignment, (3) provide students with clear guidelines for every assignment so they know exactly what they need to do as a group, (4) provide incentives for students to post not only their own thoughts, but respond to what their group members have said, and (5) provide students with examples of what it means to reflectively respond to their peers. Most of all, we would encourage instructors to make their presence known to the discussion group during every discussion. Assure students that you will be there in order to make sure everyone is on the right track, and take whatever opportunity you can to cheer the group on, highlight important ideas that different members of the group have posted, and question the group in order to get them to think more critically about the material.
John Onwuegbu

Facebook: Timeline And Privacy - 12 views

  •  
    Critics claims that the Facebook Timeline seeks to capture more users data to make its service to advertisers more targeted. Whilst other privacy concerns includes the new features ability to surface hidden information about a user without collateral consent.
Hendy Irawan

Logical Fallacies and How to Spot Them - 0 views

  •  
    "In the Evolution vs. Creationism debate, it is important to be able to spot all the logical fallacies that Creationists tend to throw around. This essay covers many bare essentials of logical thinking, as well as ways to critically evaluate an argument. The logical fallacies listed here are the ones most often used by Creationists, although Creationists have, to date, used almost every single logical fallacy in existence to "prove" their case. Each fallacy will have its own little paragraph, describing it, why it is fallacious and how to counter it. Enjoy! THE STRAWMAN ATTACK: The strawman is, perhaps, the most heavily-employed tactic used by Creationists. The strawman attack's name comes from the idea of setting up a strawman and knocking it down. The strawman is a false man, metaphorically representing a false argument. The strawman attack is a very dishonest one. Creationists ruthlessly use this tactic to win public support. In essence, the strawman attack is putting words in your opponent's mouth and then attacking the resulting position, while simultaenously evading the real argument."
Jose Antonio da Silva

JOLT - Journal of Online Learning and Teaching - 25 views

  •  
    The purpose of this paper is to interrogate critically the design and delivery of online course which address issues of race, culture, difference, or globalization
John Onwuegbu

eBook: Vulnerability Management for Dummies | Questechie - 3 views

  •  
    This 5-part ebook will help: Explain the critical need for Vulnerability Management (VM), and outline the various VM Solutions - including the pros & cons.
rjsinstitute

application development - 0 views

  •  
    Your website is one of the most visible, most accessible aspects of your business. It is often the very first interaction that many people have with your business and can therefore be instrumental in forming a first impression. Many businesses forget about this critical aspect when they are designing their website. They do so only to have an online presence and don't think much else of it. View your website as an entity in itself, and you will reap the benefits for an extended period of time. If you need a web designer/developer that can create a good website for you, you can visit ilaczen Technologies - Branding, Graphic, Web Design in Manila, and we'll be more than happy to help you. ilaczen.com
Nigel Coutts

Reflections from The Future of Education Conference - The Learner's Way - 0 views

  •  
    The Future of Education is a topic often discussed, and at the recent gathering of educators in Florence, it was the title and theme for the conference. Now in its ninth year, The Future of Education is an international conference that attracts educators from around the world and across all domains touched by education. The conference is an inspiring two days of discussion and sharing, with the city of Florence, the centre of the Renaissance, providing a constant reminder of what might be possible when creativity and critical thinking combine. Here are my key takeaways from this event.
jonnamatthew

Digital Workflow Systems: Why they matter - 0 views

  •  
    With productivity and collaboration becoming increasingly important for the success of organizations, a digital workflow system for recurring business processes is indisputably important. Workflow automation can help release critical bandwidth from key employees, which can be used for more valuable work that involves creativity and decision making. This allows companies to work far more competitively, as they shift their focus from automatable processes to offering their customers innovative solutions. A highly efficient digital workflow system essentially automates repetitive business processes, with minimum effort of input required from a user, based on business goals of delivering tangible results.
Nigel Coutts

Seven Language Moves for Learning - The Learner's Way - 0 views

  •  
    Our language choices communicate both intended and unintended messages. In the choices we make, in the subtlety of these choices, lies a truth more powerful than that conveyed by a literal reading of our words. When we look closely and critically at our use of language, we begin to see particular patterns which reveal much about what we genuinely value and expect from our learners. 
Nigel Coutts

Teaching in the 21st Century - The Learner's Way - 0 views

  •  
    The consistent message is that we are preparing our students for success in a world very different to that which was the norm only a short time ago. The implications of this change are immense and require a shift in our thinking about what matters most in our classrooms. Such is the pace of change that within any school there will be multiple generations who normalise different perspective on technology and its place in their lives. What becomes clear that the skills we most need within our schools at every level are those which are critical for individuals to be empowered, self-navigating learners. But what does this mean in practical terms?
Nik Peachey

Thinking Critically through Digital Media | PeacheyPublications.com - 3 views

  •  
    In a world where anyone with an internet connection can access, create and share information, opinions and beliefs, it has become increasingly important that students are not only able to assess the credibility of sources but also to look more deeply at the underlying motivations, beliefs and bias of the creator.
Nigel Coutts

Shifting from awareness to action - The Learner's Way - 0 views

  •  
    The evidence is mounting and the narrative around education is shifting towards a story centred on long-life skills, creativity, collaboration, critical thinking and communication. Success in the future seems to be connected closely to one's capacity to innovate, to problem find and to make strategic decisions when confronted by unique situations for which we have not been specifically prepared. 
Antwak Short videos

What is Cyber Threat Intelligence? - 0 views

  •  
    Cyber threats aimed at business are identified by Threat Intelligence. IT specialists and complex tools can read and analyze the threats. This information is utilized to plan, forestall, and recognize cyber threats hoping to exploit important organization's assets. Threat Intelligence collects and compiles the raw data about the threats emerging from different sources. Cyber threats can be truly terrifying. Cyber threat knowledge can help associations obtain important information about these threats, build successful defense equipment and relieve the threats that could harm their reputation. People often get confused with Cyber Security terms such as Threat Intelligence and Threat Data. Threat data is a list of likely threats. For instance, Facebook feeds are like a running list of possible issues. It is Threat Intelligence when IT specialists and exclusive complex tools can read and analyze the threats/attacks. Why is threat intelligence important for businesses? Threat Intelligence is a vital part of any cybersecurity. A cyber threat intelligence program sometimes called CTI, can: Prevent data loss With a very much organized CTI program set up, your organization can spot cyber threats and keep data breaches from leaking critical information. Give guidance on security measures By distinguishing and dissecting threats, CTI spots designs utilized by hackers. CTI assists organizations with setting up security standards to protect against future cyber assaults and threats. Educate others Hackers are smarter than before. To keep up, cybersecurity specialists share the strategies they've seen with the IT people group to make a communal database to battle cybercrimes and cybersecurity threats. Kinds of Threat Intelligence The four kinds of threat intelligence are strategic, tactical, technical, and operational Strategic cyber threat intelligence is generally dedicated to a non-technical audience. It utilizes nitty-gritty analyses of patterns and arising t
Antwak Short videos

Different projects that a Cybersecurity consultant works upon? - 0 views

  •  
    Cybersecurity consultants are accountable for safeguarding valuable and critical information that comes from these various parts of the digital world. They identify security threats and protect their company assets from digital assaults. Our Cyber Security professionals share some projects that they have worked on: Parul Khedwal - Cyber Security Consultant shares that she has worked with a reputed e-commerce company where she dealt with Data security and data breaches. According to her Cybersecurity is about dealing with various kinds of data breaches and cyber attacks on a day-to-day basis. Her role was to protect the company's data by performing data analysis, researching cyber signs and anonymous patterns. She worked for an e-commerce platform where her responsibility was to deal with data security, email security. Highs of Cybersecurity: She also shares that there are a lot of highs involved in the Cybersecurity role, the first reason being it is very dynamic and challenging. The subject is evolving every day which demands constant learning. The best aspect is it keeps you motivated due to the good learning opportunities involved in it. This role will never go out of the market because it's a niche skill. Cybersecurity roles have good career scope in the market. Lows of Cyber Security: Cybersecurity being very dynamic and we know that hackers can attack anytime and any day. One needs to be on their toes protecting the data as an attack may happen anytime. The cyber consultant needs to be very flexible working in odd shifts which impact the health (both physical and emotional) in the longer run. Who does a Cyber Security consultant work with? Parul is leading the Security operations team which involves working closely with her team members helping them with investigations, the client's as per their requirements, the SIM team, and various other team members which make this role a very diverse role to deal with. To summarise, a Cyber Security Consulta
Antwak Short videos

"Introduction to Data Science & AI/ML" by + professionals - 0 views

  •  
    Most business Entrepreneurs and Data Scientists can disclose how to triumph with (AI) and ML, yet rarely anyone can share to fail with such technologies. While the innovation is solid and publicised   there is a lot of ways to fall flat with AI. Let's talk about nine innovative approaches to censure any AI startup to bankruptcy. #1 Cut R&D expenses AI requires heavy expenditure in cutting-edge research, experimentation, advanced computing, and computing infrastructure. Any AI startup willing to create helpful AI innovations needs to spend a lot of money on innovative work (R&D). To scale down expenses in this area, cutting R&D expenses will rapidly make way to failure. #2 Technology Bubble operation Technology is confined to the social condition in which it is created. Technology never sustains itself but other various important aspects. AI has failed a few times since the commencement of computer science not for technical reasons but as a result of an absence of social need and interest at that point. Experience has taught that AI advancements can't be made in isolation from the social conditions that make them important (like medical care, Health analysis, and money). It is quite crucial to first engineer people to persuade them. Before designing the actual technology, visionaries and business visionaries convince them to suspend their questions and embrace the novelty and utility of disruptive ideas. Working in a bubble and overlooking the current necessities of society is a certain way to failure. #3 Prioritize Technology over business technique Only technology isn't enough to make progress, regardless of how strong it is. In the end, Tech startups also need a great strategy to succeed in being a business entity. Any startup that comes up short on a technique for recognizing objective business sectors, generating sales, and viably allotting and spending resources, yet gives need only to their technical resources, is destined to fail rapidly.
‹ Previous 21 - 40 of 80 Next › Last »
Showing 20 items per page