Skip to main content

Home/ elearning 2.0/ Group items tagged networked-learning

Rss Feed Group items tagged

Dennis OConnor

Emerging Asynchronous Conversation Models : eLearning Technology - 0 views

  • The standard model for asynchronous conversations is discussion forum software like vBulletin.  I've talked before about the significant value that can be obtained as part of Discussion Forums for Knowledge Sharing at Capital City Bank and how that translates in a Success Formula for Discussion Forums in Financial Services.  I also looked at Making Intranet Discussion Groups Effective.
  • However, I've struggled with the problem of destinations vs. social networks and the spread of conversation (see Forums vs. Social Networks). 
  • Talkwheel  is made to handle real-time group conversations and asynchronous ones.  It can act as an instant messaging service a bit like Yammer, HipChat for companies and other groups, but the layout is designed to make these discussions easier to see, archive, and work asynchronously.
  • ...5 more annotations...
  • Talkwheel’s design makes class conversations easier to follow, more interactive, and more effectively organized. It eliminates the problem of navigating multithreaded conversations, enables real-time group conversation, and makes referencing asynchronous conversations much easier. Talkwheel’s dashboard organization allows teachers to organize all their classes and projects in one centralized location, while Talkwheel's analytics helps teachers and administrators quantitatively monitor their students’ progress throughout the year.
  • Quora is a Q&A site nicely integrated with Facebook that has done a good job providing a means to ask questions and get answers.
  • Quora has been able to form quite an elite network of VCs, entrepreneurs, and other experts to answer questions.  They've also created topic pages such as: Learning Management System. 
  • Finally, Namesake, is a tool for real-time and asynchronous conversations.  It's a bit like Quora but more focused on conversation as compared to Q&A and it allows real-time conversation a bit like twitter.  You can see an example of a conversation around phones below.
  • All of these point to new types of conversation models that are emerging in tools.
  •  
    Threaded discussion is an old technology. It's inspiring to think of new ways we can talk together at a distance that allow integration of both synchronous and asynchronous technology. I often thing we'll look back on the course management systems we use today and think of them as something like a 300 baud modem. Eyes Front! What's over the horizon line?
Antwak Short videos

How to prevent Ransomware attacks in 2021? - 0 views

  •  
    Do your systems have protection against Ransomware attacks? Ransomware is a sort of malware that cybercriminals use to extort cash. It holds information to ransom with encryption or by keeping users out of their devices. Few tips to prevent Ransomware attacks: This section gives you tips on the best way to safeguard from ransomware attacks. Never click on unverified weblinks Try not to click spam emails or on unfamiliar sites. Downloads that start when you click on malicious links is one way that your system could get tainted When the ransomware is on your system, it will encrypt your information or lock your system. When the ransomware has something to hold as "hostage", it will request a payoff with the goal that you can recover your data. Paying these payoffs may seem like the easiest solution. But it is actually what the criminal needs you to do and paying these payments doesn't ensure they will give you access to your device or your data back. Never open untrusted email attachments Another way that ransomware could get onto your system is through an email attachment (Email breach) Try not to open email attachments from senders you don't trust Always download from a reliable source To decrease the risk of downloading ransomware, don't download software or media documents from unknown sites. Go to verified, trusted sites on the off chance that you need to download something. Most respectable sites will have markers of trust that you can perceive. Simply look in the hunt bar to check whether the site utilizes 'HTTPS' rather than 'HTTP.' In case you're downloading something on your mobile, ensure you download from trustworthy sources. For instance, Android telephones should use the Google Play Store to download applications and iPhone clients should use the App Store. Avoid sharing personal data If you get a call, text, or email from an untrusted source that requests personal data, don't give it out. Cybercriminals planning
cristina costa

The Job of Personal Learning | injenuity - 2 views

  • challenges faced by people joining digital personal learning spaces.
  • the introduction of the PLN must take into account individual and self.
  •  To make the experience valuable, participants need technical skills, social maturity, emotional stability, self-control, professionalism, empathy, critical thinking ability, and common sense.
  • ...16 more annotations...
  • conceptual understanding of social media
  • ability to select appropriate tools for individual situations
  • Environment
  • consider
  • hysical spaces in which the work will occur, technical specifications, administrative support, and the design of the tools
  • It is worth the battle to convince others these barriers need to be removed
  • Technical Skills
  • We need to be aware of these people in our audience when presenting these tools, so we can offer solutions and help them get up to speed
  • Social Maturity
  • Emotional Stability and Self Control
  • everyone already has a personal learning network
  • It is usually comprised of people in their face to face world, along with some they connect with digitally
  • not everyone is able to recognize when they are learning
  • encouraging the individual to recognize their own learning and identify their existing network connections
  • My final thought is that we cannot expect others to be able to make the types of connections we made in the field of educational technology
  • I am searching for solutions to make this process more transferrable across disciplines and roles.
Nigel Coutts

Why build a Personal Learning Network? - 0 views

  •  
    'Inside the Black Box' was written by Black and William in 1998 and in it they describe the classroom as a black box with inputs and outputs but what occurred inside was a mystery. For many teachers the reality has been that what occurs in their classroom has been both private and isolating, a matter between the teacher and his or her students but a task largely tackled alone. But this isolationist view is, in the age of the social media and networking increasingly challenged and more and more teachers are finding their voice, sharing their ideas and gaining valuable insights from a global community of connected educators.
Thieme Hennis

Here Are The Results From My PLN Survey! | Mobile Technology in TAFE - 0 views

  •  
    blog post about a personal learning network survey
Leo de Carvalho

Connectivism - 0 views

  •  
    Blog Connectivism networked and social learning
Dennis OConnor

Learn It In 5 - Home - 0 views

  • What is Web 2.0? Learn it in 5 minutes or less   At Learn it in 5, you'll learn what is Web 2.0, and strategies for using Web 2.0 technology in the digital classroom - all in 5 minutes or less. Learn it in 5 is a powerful library of how-to videos, produced by technology teachers, for the purpose of helping teachers and students create classroom strategies for today's 21st century's digital classroom. These step-by-step how-to videos walk teachers through Web 2.0 technology, demonstrating how to use Web 2.0 applications like blogs, social networks, podcasts, interactive videos, wikis, slide sharing and much more.
  •  
    Video site dedicated to short instructional tutorials for the technology classroom.  
Dennis OConnor

ELearning and Online Teaching Facebook Community Page - 0 views

  •  
    This Facebook page is part of an outreach effort to students in the E-Learning Certificate program at UW-Stout. It is also intended for anyone interested in E-Learning and Online teaching. I post to this page regularly on all aspects of learning online. Visit Us? Click Like to help spread the word? ~ Dennis
Mike Fandey

How to do almost anything with Posterous - 20 views

  • There are no forms to fill in; you simply send an email to post@posterous.com. Whatever you put in this email becomes the first post for your new blog.
  • When posting via email, the Subject line is the post’s title and any text or attached files also become part of the post, either embedded or as a download. The way Posterous handles media is seriously impressive. Images will display in the post, for example, while MP3s and videos are playable directly in the page. Even other files, such as PDFs and Word documents, are viewable directly from your blog.
  •  
    Great overview of how to get the most out of posterous.  Get your emails to post to a shared blog site, allow group editing of "blog", multi-post to social networks via email/posterous, etc.  Posterous adds a great level of flexibility to social networks.
Graham Atttwell

OER Storytelling Project - OER Commons - 0 views

  •  
    This storytelling framework seeks to assist OER projects in documenting and sharing key developments in the creation, use and reuse of open educational resources. By using the template to tell your story, you can help to build capacity for inquiry and information sharing across projects worldwide, which can in turn help your own as well as other projects to: * Discover unknown potential within projects; * Learn how other OER projects have overcome similar challenges and fulfilled similar needs; * Improve networking so that relevant learnings and opportunities can be identified and leveraged; * Use unique experiences and expertise to help other OER projects and to advance the field at large
Leo de Carvalho

The Effects of Twitter in an Online Learning Environment - 0 views

  •  
    If educators adopt Twitter as part of the online learning environment, can it be successfully leveraged inside and outside the classroom? With little preexisting research, it is important to understand the implications of combining social networking with class participation.
Leo de Carvalho

The Effects of Twitter in an Online Learning Environment - 0 views

  •  
    If educators adopt Twitter as part of the online learning environment, can it be successfully leveraged inside and outside the classroom? With little preexisting research, it is important to understand the implications of combining social networking with class participation.
Antwak Short videos

Different projects that a Cybersecurity consultant works upon? - 0 views

  •  
    Cybersecurity consultants are accountable for safeguarding valuable and critical information that comes from these various parts of the digital world. They identify security threats and protect their company assets from digital assaults. Our Cyber Security professionals share some projects that they have worked on: Parul Khedwal - Cyber Security Consultant shares that she has worked with a reputed e-commerce company where she dealt with Data security and data breaches. According to her Cybersecurity is about dealing with various kinds of data breaches and cyber attacks on a day-to-day basis. Her role was to protect the company's data by performing data analysis, researching cyber signs and anonymous patterns. She worked for an e-commerce platform where her responsibility was to deal with data security, email security. Highs of Cybersecurity: She also shares that there are a lot of highs involved in the Cybersecurity role, the first reason being it is very dynamic and challenging. The subject is evolving every day which demands constant learning. The best aspect is it keeps you motivated due to the good learning opportunities involved in it. This role will never go out of the market because it's a niche skill. Cybersecurity roles have good career scope in the market. Lows of Cyber Security: Cybersecurity being very dynamic and we know that hackers can attack anytime and any day. One needs to be on their toes protecting the data as an attack may happen anytime. The cyber consultant needs to be very flexible working in odd shifts which impact the health (both physical and emotional) in the longer run. Who does a Cyber Security consultant work with? Parul is leading the Security operations team which involves working closely with her team members helping them with investigations, the client's as per their requirements, the SIM team, and various other team members which make this role a very diverse role to deal with. To summarise, a Cyber Security Consulta
Robinson Kipling

Social Network Marketing: - 1 views

Apart from these above services, you can avail with Social Media Marketing campaigns. It encourages the promotion. Red web Design offers you with the best Social Networking Marketing that allows yo...

education web2.0 learning tools technology elearning resources e-learning games

started by Robinson Kipling on 06 Dec 13 no follow-up yet
Martin Burrett

PLNning to Inspire - 0 views

  •  
    Blog post that encourages all teachers to get online to improve their practice and sharing what they do to a personal learning network. Download the PDF poster to put in your staffroom.
anonymous

Amzini | 70+ Social Networks for Education - 0 views

  •  
    Amzini is a specialized search engine for social networks designed to help you explore, compare, and learn about social networking and social media. This link is to the education category, where you will find social communities for alumni, language, literature, professionals, science, students, & writing.
twitteraccounts1

buy linkedin accounts-100% full verified account,and cheap.. - 0 views

  •  
    Buy LinkedIn Accounts Introduction When you buy a LinkedIn account, you're really buying access to a powerful business networking tool. By having a LinkedIn account, you'll be able to connect with other business professionals in your field and build valuable relationships. When you're ready to takelinkedin accounts your business to the next level, a LinkedIn account can give you the boost you need. There are a few things to consider when you're buying a LinkedIn account. First, you'll want to make sure that the account is active and has a good reputation. LinkedIn is a community of business professionals, so you'll want to make sure that you're dealing with someone who is respected within the community. You can check out profiles of potential sellers to see how active they are and what kind of feedback they've received from other buyers. Second, you'll want to consider the price. LinkedIn accounts can vary widely in price, depending on the seller and the quality of the account. If you're looking for a bargain, you might be able to find a lower-priced account that still has a good reputation. However, if you're looking for a top-notch account with a lot of connections, you'll likely have to pay more. Third, you'll want to think about what you'll use the account for. If you're just looking to make a few business contacts, you might be able to get by with a lower-priced account. However, if you're looking to use the account to build a large network of contacts, you'll need to make sure that you buy an account with a lot of connections. When you buy a LinkedIn account, you're really buying access to a powerful business networking tool. By having a LinkedIn account, you'll be able to connect with other business professionals in your field and build valuable relationships. When you're ready to take your business to the next level, a LinkedIn account can give you the boost you need. https://www.google.com/
Thieme Hennis

Sclipo: the social learning revolution - 0 views

  •  
    Sclipo helps you to teach and learn just about everything, from technology to languages or cooking, and connects you with people of common interests.
Janos Haits

OpenHPI.de/ - 0 views

  •  
    the educational Internet platform of the German Hasso Plattner Institute, Potsdam. Starting in September you will be able to take part in our worldwide social learning network based on interactive online courses covering different subjects in Information and Communications Technology (ICT). Enter a fascinating world of knowledge with our free open online courses. Meet other participants from around the world and familiarize yourself with fundamental and current topics in ICT, computer science and IT systems engineering.
John Onwuegbu

Machine Learning: How Twitter 'Connect' feature for iOS and Android works? | Questechie - 1 views

  •  
    While, Twitter has acknowledged that its social network is more of a news and entertainment service than a way to connect with loved ones, the new "Connect" feature may perhaps bring back the good old memories of friends and family.
« First ‹ Previous 41 - 60 of 124 Next › Last »
Showing 20 items per page