Skip to main content

Home/ elearning 2.0/ Group items matching "networking" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Submit Your Favorite Education Infographics : The Best Education Infographics - 0 views

  •  
    eLearningInfographics: The Best Education Infographics As founder of the eLearning Industry's network I am super excited with our new user-generated infographics site. A few months ago, several members of the eLearning Industry network contacted me requesting a website that would be dedicated to the best education infographics. Having this in mind, we formed a team of creative, hard-working, and passionate online educators. As a consequence, we just released the eLearningInfographics.com Submit Your Favorite Education Infographics
1More

What Does the Online Digital Footprint in Your Classroom Look Like? - 9 views

  •  
    In contrast to the digital footprint you use for your personal learning network, this focus is on the online digital footprint students' use in your science or math classroom. The power of a well designed digital footprint brings the capacity to transform a classroom into an online learning community. Within this community your students use digital tools to create and develop a personal learning network.
1More

Evaluating Social Networking Services - 0 views

  •  
    There are many social networking services. New sites appear daily and existing sites update their services all the time in what is still a rapidly developing area. Most services are profile or content focused, and although they may seem to offer similar services, there are significant differences between sites, tools and services.
1More

ed4wb » Blog Archive » Insulat-Ed - 0 views

  •  
    great blog post about networked learning and a nice analogy with Clay Shirky's book "Here Comes Everybody"
1More

beamtenherrschaft: Knowledge Networks - The Social Software Perspective - 0 views

  •  
    Knowledge Networks - The Social Software Perspective
1More

Social Networking, Web 2.0, and Learning: What the Research Says - 1 views

  •  
    Notes from Cheryl Lemke's COSN09 session "Social Networking, Web 2.0, and Learning: What the Research Says."
1More

Free Internet Radio - Social Broadcasting | BlogTalkRadio - 0 views

  •  
    BlogTalkRadio is the social radio network that allows users to connect quickly and directly with their audience. Using an ordinary telephone and computer hosts can create free, live, call-in talk shows with unlimited participants that are automatically archived and made available as podcasts. No software download is required. Listeners can subscribe to shows via RSS into iTunes and other feed readers. Our network has produced tens of thousands of episodes since it launched in August of 2006.
2More

Warning to parents over children 'being raised online' | Society | The Guardian - 0 views

  •  
    British children are spending more than 20 hours a week online, most of it at social networking sites such as MySpace, Facebook and Bebo, and are in effect being "raised online", according to research from the Institute for Public Policy Research.
  •  
    Newspaper report of useful UK based study on young peoples use of social networking sites.
3More

How to do almost anything with Posterous - 20 views

  • There are no forms to fill in; you simply send an email to post@posterous.com. Whatever you put in this email becomes the first post for your new blog.
  • When posting via email, the Subject line is the post’s title and any text or attached files also become part of the post, either embedded or as a download. The way Posterous handles media is seriously impressive. Images will display in the post, for example, while MP3s and videos are playable directly in the page. Even other files, such as PDFs and Word documents, are viewable directly from your blog.
  •  
    Great overview of how to get the most out of posterous.  Get your emails to post to a shared blog site, allow group editing of "blog", multi-post to social networks via email/posterous, etc.  Posterous adds a great level of flexibility to social networks.
1More

How to Create a Lifelong Learning Network: Continuing Education is Based on Need to Ada... - 0 views

  •  
    Creating a lifelong learning network is essential for adults who pursue continuing education as means to advance their professional career or improve their personal life. Regardless of the reason for continuing one's education, an adult's knowledge needs to continually grow. The changing nature of today's society demands the necessity for gaining new skills, new understandings, and new intellectual orientations throughout a person's life.
1More

Pursuing the elusive metaphor of community in virtual learning environments - 1 views

  •  
    "Social networking software sites are often mistakenly called learning communities, betraying a significant lack of agreement or concern for what actually constitutes a community. However, social networking sites are being used by teachers to engage students in dynamic ways, and by learners as vehicles for constructing their own, very personal learning environments and communities. This paper draws on lessons we have learned about building personal learning environments and virtual communities from our research and experience in formal and non-formal learning environments. It addresses the key questions of how can we construct, maintain and usher out communities, who joins communities, and what characteristics of communities seem to be shared across learning environments. The paper also questions whether the label "community" is actually a failed metaphor for something that seems to be much too dynamic and elusive to capture with a single construct. "
1More

Home - Social Networking - 0 views

  •  
    E-Learning and Social Networking Handbook: Resources for Higher Education Wiki
13More

Emerging Asynchronous Conversation Models : eLearning Technology - 0 views

  • The standard model for asynchronous conversations is discussion forum software like vBulletin.  I've talked before about the significant value that can be obtained as part of Discussion Forums for Knowledge Sharing at Capital City Bank and how that translates in a Success Formula for Discussion Forums in Financial Services.  I also looked at Making Intranet Discussion Groups Effective.
  • However, I've struggled with the problem of destinations vs. social networks and the spread of conversation (see Forums vs. Social Networks). 
  • Talkwheel  is made to handle real-time group conversations and asynchronous ones.  It can act as an instant messaging service a bit like Yammer, HipChat for companies and other groups, but the layout is designed to make these discussions easier to see, archive, and work asynchronously.
  • ...5 more annotations...
  • Talkwheel’s design makes class conversations easier to follow, more interactive, and more effectively organized. It eliminates the problem of navigating multithreaded conversations, enables real-time group conversation, and makes referencing asynchronous conversations much easier. Talkwheel’s dashboard organization allows teachers to organize all their classes and projects in one centralized location, while Talkwheel's analytics helps teachers and administrators quantitatively monitor their students’ progress throughout the year.
  • Quora is a Q&A site nicely integrated with Facebook that has done a good job providing a means to ask questions and get answers.
  • Quora has been able to form quite an elite network of VCs, entrepreneurs, and other experts to answer questions.  They've also created topic pages such as: Learning Management System. 
  • Finally, Namesake, is a tool for real-time and asynchronous conversations.  It's a bit like Quora but more focused on conversation as compared to Q&A and it allows real-time conversation a bit like twitter.  You can see an example of a conversation around phones below.
  • All of these point to new types of conversation models that are emerging in tools.
  •  
    Threaded discussion is an old technology. It's inspiring to think of new ways we can talk together at a distance that allow integration of both synchronous and asynchronous technology. I often thing we'll look back on the course management systems we use today and think of them as something like a 300 baud modem. Eyes Front! What's over the horizon line?
1More

Top 10 Podcasts for Cybersecurity in 2021 - 0 views

  •  
    Cybersecurity is an area that is new and exciting. People like to know how to be safe from cyber attacks to digital terrorism. It can at first seem daunting to dive into the field of cybersecurity because it is a complex topic. However, with technology being a greater part of everyday life, it is a must to know about cyber risks. Cybersecurity podcasts have been a useful tool for years to absorb security content, keep updated with the recent risks, hear about current events, and everything else you need to know in order to stay at the top of your game. If you work in technology or are only starting to learn about the field, these are the best podcasts on the topic of cybersecurity. There are several great podcasters lauding from the security field, delivering decades of experience, fresh experiences, and useful knowledge to listeners around the globe. We have discovered 10 podcasts full of engaging conversations, interviews, and resources on recent trends and events. These podcasts are great at keeping up on the news, gathering valuable advice, not to forget that they are fun to listen to, from the newest security technologies to the emergence of new malware. Here goes the list of top 10 podcasts in cybersecurity in 2021. 1. Darknet Diaries: Host: Jack Rhysider Date of podcast launch: September 2017 Three typical topics: ATM hacking, the history of carding, Stuxnet Available on: RSS, YouTube, Spotify, iTunes, Google, Overcast, Stitcher and others Average episode length: 60 minutes, bi-weekly Website: darknetdiaries.com Darkest Diaries is undoubtedly amongst one of the most fascinating and interesting podcasts. Something that should be on the top of your watchlist. This investigatory podcast digs deeper into actual tales about cybercrime, malware, and everything else on the internet that is suspicious. Darknet Diaries provides extensive review for those who are pragmatic about the data breaches faced to today's people and corporations, featuring "true stories f
1More

How to prevent Ransomware attacks in 2021? - 0 views

  •  
    Do your systems have protection against Ransomware attacks? Ransomware is a sort of malware that cybercriminals use to extort cash. It holds information to ransom with encryption or by keeping users out of their devices. Few tips to prevent Ransomware attacks: This section gives you tips on the best way to safeguard from ransomware attacks. Never click on unverified weblinks Try not to click spam emails or on unfamiliar sites. Downloads that start when you click on malicious links is one way that your system could get tainted When the ransomware is on your system, it will encrypt your information or lock your system. When the ransomware has something to hold as "hostage", it will request a payoff with the goal that you can recover your data. Paying these payoffs may seem like the easiest solution. But it is actually what the criminal needs you to do and paying these payments doesn't ensure they will give you access to your device or your data back. Never open untrusted email attachments Another way that ransomware could get onto your system is through an email attachment (Email breach) Try not to open email attachments from senders you don't trust Always download from a reliable source To decrease the risk of downloading ransomware, don't download software or media documents from unknown sites. Go to verified, trusted sites on the off chance that you need to download something. Most respectable sites will have markers of trust that you can perceive. Simply look in the hunt bar to check whether the site utilizes 'HTTPS' rather than 'HTTP.' In case you're downloading something on your mobile, ensure you download from trustworthy sources. For instance, Android telephones should use the Google Play Store to download applications and iPhone clients should use the App Store. Avoid sharing personal data If you get a call, text, or email from an untrusted source that requests personal data, don't give it out. Cybercriminals planning
1More

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
1More

The Power of Making Thinking Visible with Ron Ritchhart & Mark Church - The Learner's Way - 0 views

  •  
    On Saturday PZ Sydney Network hosted Ron Ritchhart and Mark Church for a conversation about their new book, "The Power of Making Thinking Visible". What follows is a summary of some of the key messages from this conversation. You can watch the whole conversation above. For more learning opportunities like this visit the PZ Sydney Network or follow @pzsydnetwork on Twitter.
1More

Printer Not Showing Up On Network - How To Fix It? - 0 views

  •  
    Having trouble getting your printer to show up on the network? If yes, you're on the right page. While printers are incredibly useful tools, they can be incredibly frustrating to troubleshoot when they don't work properly. Thankfully, you can take a few simple steps to fix this issue. So, why wait? Let's get started!
1More

December 2016 UKEd Magazine - 0 views

  •  
    Free online education magazine to read or download (PDF) This issue has a 'Teacher Network' theme. Includes community nominations for best educators to follow on Twitter.
1More

Learning in the age of Social Networks - The Learner's Way - 0 views

  •  
    Learning is a social endeavour. Schools need to understand that for our students the social landscape has changed. Rather than turning away from this reality we need to understand what it means and what our children need to know and learn to safely maximise the opportunities it brings.
‹ Previous 21 - 40 of 292 Next › Last »
Showing 20 items per page