Skip to main content

Home/ Educational Technology and Change Journal/ Group items tagged Computing

Rss Feed Group items tagged

Pew study: E-readers have caught on quickly - 1 views

started by Bonnie Sutton on 05 Apr 12 no follow-up yet

Who really benefits from putting high-tech gadgets in classrooms? - 2 views

started by Bonnie Sutton on 07 Feb 12 no follow-up yet

Keep the Internet Open - 1 views

started by Bonnie Sutton on 18 Jul 12 no follow-up yet
1More

Principals Call for Mobile and Social Technologies in Schools -- THE Journal - 0 views

  •  
    " * By David Nagel * 05/23/11 The National Association of Secondary School Principals is looking to change the conversation about mobile computing and social media in schools. The group's board of directors recently released a position statement advocating greater access to and acceptance of technologies like smart phones and social networking sites in educational institutions. The statement characterized mobile and social technologies as both crises and opportunities for leaders, saying confusion among many principals has to date led many school leaders to knee-jerk policy decisions, such as outright bans on specific technologies. But these bans, in addition to being misguided, have been ineffective."
2More

Make: Online | Walled Gardens vs. Makers - 0 views

  •  
    Cory Doctorow. Make. June 2011. "Consider the iPad for a moment. It's true that Apple's iTunes Store has inspired hundreds of thousands of apps, but every one of those apps is contingent on Apple's approval. If you want to make something for the iPad, you pay $99 to join the Developer Program, make it, then send it to Apple and pray. If Apple smiles on you, you can send your hack to the world. If Apple frowns on you, you cannot. What's more, Apple uses code signing to restrict which apps can run on the iPad (and iPhone): if your app isn't blessed by Apple, iPads will refuse to run it. Not that it's technically challenging to defeat this code signing, but doing so is illegal, thanks to the 1998 Digital Millennium Copyright Act, which makes it a crime to circumvent a copyright-protection technology. So the only app store - or free repository - that can legally exist for Apple's devices is the one that Apple runs for itself. Some people say the iPad is a new kind of device: an appliance instead of a computer. But because Apple chose to add a thin veneer of DRM to the iPad, the Digital Millennium Copyright Act applies here, something that's not true of any "appliance" you've ever seen. It's as if Apple built a toaster that you can only use Apple's bread in (or face a lawsuit), or a dishwasher that will only load Apple's plates. Apple fans will tell you that this doesn't matter. Hackers can simply hack their iPads or shell out $99 to get the developer license. But without a means of distributing (and receiving) hacks from all parties, we're back in the forbidden-knowledge Dark Ages - the poverty-stricken era in which a mere handful of ideas was counted as a fortune."
  •  
    We discussed this article in the forum of lascuolachefunziona.it. Someone objected that the iPad was a great tool and gave far more liberty to developers than traditional print publishers. I retorted that it was precisely because the iPad was such a great tool that its proprietariness about content for it was irritating. Then Elena Favaron made an illuminating comparison: "There are also people who make coffee machines that work only with dedicated coffee capsules, and there are folks who even buy them..."

The Physics of Animation - 4 views

started by Bonnie Sutton on 13 Jun 11 no follow-up yet

Phone Hacking, Regulation of Social Networking Services - 1 views

started by Bonnie Sutton on 09 Aug 11 no follow-up yet
1More

Rogue Downloader's Arrest Could Mark Crossroads for Open-Access Movement - Technology -... - 0 views

  •  
    "July 31, 2011 By David Glenn Cambridge, Mass. This past April in Switzerland, Lawrence Lessig gave an impassioned lecture denouncing publishers' paywalls, which charge fees to read scholarly research, thus blocking most people from access. It was a familiar theme for Mr. Lessig, a professor at Harvard Law School who is one of the world's most outspoken critics of intellectual-property laws. But in this speech he gave special attention to JSTOR, a not-for-profit journal archive. He cited a tweet from a scholar who called JSTOR "morally offensive" for charging $20 for a six-page 1932 article from the California Historical Society Quarterly. The JSTOR archive is not usually cast as a leading villain by open-access advocates. But Mr. Lessig surely knew in April something that his Swiss audience did not: Aaron Swartz-a friend and former Harvard colleague of Mr. Lessig's-was under investigation for misappropriating more than 4.8 million scholarly papers and other files from JSTOR. On July 19, exactly three months after Mr. Lessig's speech, federal prosecutors unsealed an indictment charging that Mr. Swartz had abused computer networks at the Massachusetts Institute of Technology and disrupted JSTOR's servers. If convicted on all counts, Mr. Swartz faces up to 35 years in prison."
1More

How Google Dominates Us by James Gleick | The New York Review of Books - 0 views

  •  
    How Google Dominates Us August 18, 2011 James Gleick "This much is clear: We need to decide what we want from Google. If only we can make up our collective minds. Then we still might not get it. The company always says users can "opt out" of many of its forms of data collection, which is true, up to a point, for savvy computer users; and the company speaks of privacy in terms of "trade-offs," to which Vaidhyanathan objects: Privacy is not something that can be counted, divided, or "traded." It is not a substance or collection of data points. It's just a word that we clumsily use to stand in for a wide array of values and practices that influence how we manage our reputations in various contexts. There is no formula for assessing it: I can't give Google three of my privacy points in exchange for 10 percent better service. This seems right to me, if we add that privacy involves not just managing our reputation but protecting the inner life we may not want to share. In any case, we continue to make precisely the kinds of trades that Vaidhyanathan says are impossible. Do we want to be addressed as individuals or as neurons in the world brain? We get better search results and we see more appropriate advertising when we let Google know who we are. And we save a few keystrokes."

What Do We Need to Power Next Generation Assessment Systems? - 2 views

started by Bonnie Sutton on 01 Aug 11 no follow-up yet

STEM TO STEAM - 1 views

started by Bonnie Sutton on 07 Oct 11 no follow-up yet
« First ‹ Previous 41 - 60 of 99 Next › Last »
Showing 20 items per page