Archive of ‘Digital literacy’ category

writing first draft

Writing the First Draft: The No-Nonsense Guide for Authors

  • I go to a quiet room, office, library or coffee shop.
  • Depending on where I am, I brew/order a cup of coffee.
  • I disconnect my computer from the internet.
  • I put my phone in airplane mode.
  • I open up Scrivener.
  • I arrange the outline for the chapter in question.
  • I set a timer for 30 minutes.
  • I write, keep my fingers moving and avoid stopping to edit myself (this is harder than it sounds).
  • When the buzzer sounds, I stand up and take a two-minute break.
  • After this break, I review my outline and notes.

+++++++++++++++++++++

25 Things About Writing

by Justin McLachlan  http://www.justinmclachlan.com/1670/25-things-writing/

also in: http://pin.it/HwXSc4n

  • Real writing is actually a lot of rewriting.
  • Your friends won’t be as impressed the second time around. Don’t let it stop you.
  • Grammar, punctuation, spelling — it’s okay if all these things come last.
  • First drafts universally suck.
  • Avoid the advice of those who tell you otherwise of #5.
  • Trying to edit while writing is like trying to chop down a tree while you’re climbing it
  • Writing can be lonely. Very, very lonely.
  • Inspiration will never strike when you need it to. Just write. Do the work.
  • Complex construction doesn’t equal complex though. Simplify.
  • Deadlines. Goals. Set them, and stick to them.

++++++++++++++++++++
more on proofreading in this IMS blog
https://blog.stcloudstate.edu/ims?s=proofreading
more proofreading techniques for the EDAD doctoral cohort on Pinterest
https://www.pinterest.com/aidedza/doctoral-cohort/

immersive reality education conference

Immerse Yourself in Learning

Realities360. The Enhanced Realities Conference

Augmented Reality

Augmented reality adds computer-generated content as a contextual overlay to the real world. This technology, often powered by devices we already carry, has enormous applications for training and development.

Virtual Reality

Virtual reality has existed for decades, but technology has finally emerged that makes it truly accessible. VR allows us to put learners in a truly immersive environment, creating entirely new opportunities for training and learning.

Expanded Realities

AR and VR are just the start of the alternate-reality conversation. There are additional technologies that we can use on their own or as part of a blend with AR and VR to increase the level of immersion in the experiences we create.

Sessions list: https://www.elearningguild.com/realities360/content/4900/2017-realities360-conference–home/?utm_campaign=r17early&utm_medium=social&utm_source=linkedin-el2#sessions-link

++++++++++++++++++++++++
more on VR, AR in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

tutorials on MediaSpace

https://nhcc.ims.mnscu.edu/shared/StudentTraining/MediaSpace%20Instructions-Students.pdf
https://blog.stcloudstate.edu/ims/files/2013/10/Getting-Started-with-MediaSpace-v5-14ziaj5.pdf

https://learn.winona.edu/MediaSpace

https://knowledge.kaltura.com/kaltura-capturespace-lite-getting-started

https://knowledge.kaltura.com/kaltura-capturespace-lite-user-guide

++++++++++++++
more on MediaSpace in this IMS blog
https://blog.stcloudstate.edu/ims?s=mediaspace

bitly vs goo.gl

Bitly vs. Goo.gl

http://www.freetech4teachers.com/2017/05/bitly-vs-googl.html

Bitly – Pros & Cons
Pro – If you create a free Bitly.com account you can customize your shortened URLs so that they spell words or at least have initials and numbers that are related to an event.

Con –  A few years ago Bitly removed the option to create QR codes while also shortening URLs. So if you need a QR code to go with your shortened URL, you might want to try Goo.gl.

Goo.gl – Pros & Cons
Pro – Goo.gl is available in your Google Account. You can create shortened URLs and QR codes at the same time in Goo.gl.

Con – Goo.gl doesn’t let you customize the shortened URL that is generated for you. You’re stuck with the randomly generated characters that are given to you.

+++++++++++++++
more on link shorteners in this IMS blog
https://blog.stcloudstate.edu/ims?s=link+shortener

summer readings

Abramson, a former executive editor of The New York Times and current Harvard English lecturer, recommends students read Richard Hofstadter’s “The Paranoid Style in American Politics,” first published in 1964.

James Berger is a senior Lecturer in English and American Studies at Yale University. He recommends the 2014 novel “Orfeo,” by Richard Powers.

Eric Maskin is a Harvard professor and received the 2007 Nobel Memorial Prize in Economics. Maurice Schweitzer is a professor of operations, information, and decisions at the Wharton School at the University of Pennsylvania. Both chose Michael Lewis’ “The Undoing Project.”

David B. Carter is a politics professor at Princeton University. He recommended “The Strategy of Conflict,” by Thomas Schelling, especially given the author’s recent death.

WJT Mitchell is an English and Art History professor at the University of Chicago.

He recommends a book by French philosopher Gregoire Chamayou called “A Theory of the Drone,” which attempts to understand how drones have revolutionized warfare.

Kenneth Warren is an English professor at The University of Chicago.

He recommends “Racecraft: The Soul of Inequality in American Life,” by Karen E. Fields and Barbara J. Fields

Fool

 

1 110 111 112 113 114 176