Searching for "hacker"

FCC and netneutrality

https://hackernoon.com/more-than-a-million-pro-repeal-net-neutrality-comments-were-likely-faked-e9f0e3ed36a6

Jeff Kao Data Scientist, Software Engineer, Language Nerd, Biglaw Refugee. jeffykao.com

More than a Million Pro-Repeal Net Neutrality Comments were Likely Faked

++++++++++++++++

https://www.nytimes.com/2017/11/21/technology/fcc-net-neutrality.html

The Federal Communications Commission released a plan on Tuesday to dismantle landmark regulations that ensure equal access to the internet, clearing the way for internet service companies to charge users more to see certain content and to curb access to some websites.

The proposal, made by the F.C.C. chairman, Ajit Pai, is a sweeping repeal of rules put in place by the Obama administration. The rules prohibit high-speed internet service providers, or I.S.P.s, from stopping or slowing down the delivery of websites. They also prevent the companies from charging customers extra fees for high-quality streaming and other services.

++++++++++

FCC chairman defends net neutrality repeal plan

“All we are simply doing is putting engineers and entrepreneurs, instead of bureaucrats and lawyers, back in charge of the internet,” Pai said on Fox News’s “Fox & Friends,”

Pai on Tuesday confirmed his plan to fully dismantle the Obama-era net neutrality rules, which were approved by the FCC’s previous Democratic majority in 2015. His order would remove bans on blocking and throttling web traffic and allow internet service providers to charge for internet “fast lanes” to consumers. The move sparked a barrage of criticism from Democrats and public interest groups who call it a giveaway to big telecom companies.

+++++++++++++++++

What Everyone Gets Wrong in the Debate Over Net Neutrality

DATE OF PUBLICATION: 06.23.14TIME OF PUBLICATION: 6:30 AM.

The only trouble is that, here in the year 2014, complaints about a fast-lane don’t make much sense. Today, privileged companies—including Google, Facebook, and Netflix—already benefit from what are essentially internet fast lanes, and this has been the case for years. Such web giants—and others—now have direct connections to big ISPs like Comcast and Verizon, and they run dedicated computer servers deep inside these ISPs. In technical lingo, these are known as “peering connections” and “content delivery servers,” and they’re a vital part of the way the internet works.

in today’s world, they don’t address the real issue with the country’s ISPs, and if we spend too much time worried about fast lanes, we could hurt the net’s progress rather than help it.

The real issue is that the Comcasts and Verizons are becoming too big and too powerful. Because every web company has no choice but to go through these ISPs, the Comcasts and the Verizons may eventually have too much freedom to decide how much companies must pay for fast speeds.

++++++++++++++++

FAKE AMERICANS ARE INFLUENCING THE DEBATE OVER NET NEUTRALITY, SAYS NEW YORK’S ATTORNEY GENERAL

http://www.newsweek.com/bots-influencing-debate-over-net-neutrality-says-new-york-attorney-general-719454
An analysis of the millions of comments conducted by the data company Gravwell in October found that just 17.4 percent of the comments to the FCC on the net neutrality rules came from real people.
+++++++++++++++
Finley, K. (2017, November 22). Here’s How the End of Net Neutrality Will Change the Internet. WIRED. Retrieved from https://www.wired.com/story/heres-how-the-end-of-net-neutrality-will-change-the-internet/
Because many internet services for mobile devices include limits on data use, the changes will be visible there first. In one dramatic scenario, internet services would begin to resemble cable-TV packages, where subscriptions could be limited to a few dozen sites and services. Or, for big spenders, a few hundred. Fortunately, that’s not a likely scenario. Instead, expect a gradual shift towards subscriptions that provide unlimited access to certain preferred providers while charging extra for everything else.
Even Verizon’s “unlimited” plans impose limits. The company’s cheapest unlimited mobile plan limits video streaming quality to 480p resolution, which is DVD quality, on phones and 720p resolution, the lower tier of HD quality, on tablets. Customers can upgrade to a more expensive plan that enables 720p resolution on phones and 1080p on tablets, but the higher quality 4K video standard is effectively forbidden.
Meanwhile, Comcast customers in 28 states face 1 terabyte data caps. Going over that limit costs subscribers as much as an additional $50 a month. As 4K televisions become more common, more households may hit the limit. That could prompt some to stick with a traditional pay-TV package from Comcast.
Republican FCC Chair Ajit Pai argues that Federal Trade Commission will be able to protect consumers and small business from abuses by internet providers once the agency’s current rules are off the books. But that’s not clear.
The good news is the internet won’t change overnight, if it all. Blake Reid, a clinical professor at Colorado Law, says the big broadband providers will wait to see how the inevitable legal challenges to the new FCC order shakeout. They’ll probably keep an eye on 2018 and even 2020 elections as well.

++++++++++++++++
more on netneutrality in this IMS blog
https://blog.stcloudstate.edu/ims?s=netneutrality

topics for IM260

proposed topics for IM 260 class

  • Media literacy. Differentiated instruction. Media literacy guide.
    Fake news as part of media literacy. Visual literacy as part of media literacy. Media literacy as part of digital citizenship.
  • Web design / web development
    the roles of HTML5, CSS, Java Script, PHP, Bootstrap, JQuery, React and other scripting languages and libraries. Heat maps and other usability issues; website content strategy. THE MODEL-VIEW-CONTROLLER (MVC) design pattern
  • Social media for institutional use. Digital Curation. Social Media algorithms. Etiquette Ethics. Mastodon
    I hosted a LITA webinar in the fall of 2016 (four weeks); I can accommodate any information from that webinar for the use of the IM students
  • OER and instructional designer’s assistance to book creators.
    I can cover both the “library part” (“free” OER, copyright issues etc) and the support / creative part of an OER book / textbook
  • Big Data.” Data visualization. Large scale visualization. Text encoding. Analytics, Data mining. Unizin. Python, R in academia.
    I can introduce the students to the large idea of Big Data and its importance in lieu of the upcoming IoT, but also departmentalize its importance for academia, business, etc. From infographics to heavy duty visualization (Primo X-Services API. JSON, Flask).
  • NetNeutrality, Digital Darwinism, Internet economy and the role of your professional in such environment
    I can introduce students to the issues, if not familiar and / or lead a discussion on a rather controversial topic
  • Digital assessment. Digital Assessment literacy.
    I can introduce students to tools, how to evaluate and select tools and their pedagogical implications
  • Wikipedia
    a hands-on exercise on working with Wikipedia. After the session, students will be able to create Wikipedia entries thus knowing intimately the process of Wikipedia and its information.
  • Effective presentations. Tools, methods, concepts and theories (cognitive load). Presentations in the era of VR, AR and mixed reality. Unity.
    I can facilitate a discussion among experts (your students) on selection of tools and their didactically sound use to convey information. I can supplement the discussion with my own findings and conclusions.
  • eConferencing. Tools and methods
    I can facilitate a discussion among your students on selection of tools and comparison. Discussion about the their future and their place in an increasing online learning environment
  • Digital Storytelling. Immersive Storytelling. The Moth. Twine. Transmedia Storytelling
    I am teaching a LIB 490/590 Digital Storytelling class. I can adapt any information from that class to the use of IM students
  • VR, AR, Mixed Reality.
    besides Mark Gill, I can facilitate a discussion, which goes beyond hardware and brands, but expand on the implications for academia and corporate education / world
  • IoT , Arduino, Raspberry PI. Industry 4.0
  • Instructional design. ID2ID
    I can facilitate a discussion based on the Educause suggestions about the profession’s development
  • Microcredentialing in academia and corporate world. Blockchain
  • IT in K12. How to evaluate; prioritize; select. obsolete trends in 21 century schools. K12 mobile learning
  • Podcasting: past, present, future. Beautiful Audio Editor.
    a definition of podcasting and delineation of similar activities; advantages and disadvantages.
  • Digital, Blended (Hybrid), Online teaching and learning: facilitation. Methods and techniques. Proctoring. Online students’ expectations. Faculty support. Asynch. Blended Synchronous Learning Environment
  • Gender, race and age in education. Digital divide. Xennials, Millennials and Gen Z. generational approach to teaching and learning. Young vs old Millennials. Millennial employees.
  • Privacy, [cyber]security, surveillance. K12 cyberincidents. Hackers.
  • Gaming and gamification. Appsmashing. Gradecraft
  • Lecture capture, course capture.
  • Bibliometrics, altmetrics
  • Technology and cheating, academic dishonest, plagiarism, copyright.

blockchain credentialing in higher ed

2 reasons why blockchain tech has big, tangible implications for higher ed

By Jami Morshed September 27th, 2017

What Is Blockchain?

blockchain is a database or digital ledger. The data in the ledger is arranged in batches known as blocks, with each block storing data about a specific transaction. The blocks are linked together using cryptographic validation to form an unbroken and unbreakable chain–hence the name blockchain. As it relates to bitcoin, the blocks are monetary units, and the chain includes information about all past transactions of that monetary unit.

Importantly, the database (i.e., the series of blocks) is duplicated thousands of times across a network of computers, meaning that it has no one central repository. This not only means that the records are truly public, but also that there is no centralized version of the data for a hacker to corrupt. In order to make changes to the ledger, consensus between all members of the group must be obtained, further adding to the system’s security.

1. Blockchain for the Future of Credentialing

With today’s technologies, graduates and prospective employers must go through a tedious process to obtain student transcripts or diplomas, and this complexity is compounded when these credentials are spread across multiple institutions. Not only that, but these transcripts can take days or weeks to produce and send, and usually require a small fee be paid to the institution.LinkedLinek

This could be a key enabler to facilitate student ownership of this data and would allow them to instantly produce secure and comprehensive credentials to any institute or employer requesting them, including information about a student’s performance on standardized tests, degree requirements, extracurricular activities, and other learning activities.

Blockchain could play a major role in Competency-Based Education (CBE) programs and micro-credentialing, which are becoming ever more popular across universities and internal business training programs.

various companies are currently working on such a system of record. One of the most well-known is called “BlockCert,” which is an open standard created by MIT Media Lab and which the institute hopes will help drive the adoption of blockchain credentialing.

imagine the role that LinkedIn or a similar platform could play in the distribution of such content. Beyond verification of university records, LinkedIn could become a platform for sharing verified work history and resumes as well, making the job application process far simpler

2. Blockchain’s Financial Implications and Student debt

how could blockchain influence student finances? For starters, financial aid and grants could be tied to student success. Instead of students and universities having to send over regular progress reports on a recipient’s performance, automatic updates to a student’s digital record would ensure that benchmarks were being met–and open up new opportunities for institutions looking to offer merit-based grants.

Electronic tuition payments and money transfers could also simplify the tuition process. This is an especially appealing option for international students, as bitcoin’s interchangeable nature and lack of special fees for international transfers makes it a simpler and more cost-effective payment method.

++++++++++++++++++++++++++++
more on credentialing in this IMS blog
https://blog.stcloudstate.edu/ims?s=credentialing

more on blockchain credentialing in this IMS blog
https://blog.stcloudstate.edu/ims/2016/10/03/blockchain-credentialing/

blogging for Confucius Institute

Minutes from the Oct 17 meeting:

++++++++++++++++++

Plan for August 17

Introduce students to the blog idea. Short link to this planhttp://bit.ly/blog4ci

https://blog.stcloudstate.edu/ims/2017/08/17/blogging-for-confucius-institute/

  • Why blog
    • What is social media, when SM started
    • What is blog, when blogs started
    • Why blog
      • Blogging vs microblogging

https://blog.stcloudstate.edu/ims/2015/12/31/social-media-and-the-devaluation/
https://blog.stcloudstate.edu/ims/2016/01/01/blog-future/

+++++++++++++++++++++++++++++++++++++++++++++++
handout on basic functions with your blog

+++++++++++++++++++++++++++++++++++++++++++++++

 

 

anonymous browsing data

‘Anonymous’ browsing data can be easily exposed, researchers reveal

https://www.theguardian.com/technology/2017/aug/01/data-browsing-habits-brokers

A similar strategy was used in 2008, Dewes said, to deanonymise a set of ratings published by Netflix to help computer scientists improve its recommendation algorithm: by comparing “anonymous” ratings of films with public profiles on IMDB, researchers were able to unmask Netflix users – including one woman, a closeted lesbian, who went on to sue Netflix for the privacy violation.

++++++++++++++++
A hacker explains the best way to browse the internet anonymously.
https://www.facebook.com/techinsider/videos/824655787732779/ 

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

RFID blocking

There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID

card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.

REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.

Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.

Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.

if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
+++++++++++++++
more on cybersecurity in this IMS blog

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

edmodo accounts compromised

Edmodo Investigates Millions of User Accounts for Sale on Dark Web

By Sri Ravipati  05/12/17

https://thejournal.com/articles/2017/05/12/millions-of-edmodo-user-accounts-for-sale-on-dark-web.aspx

A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo

LeakBase yesterday Tweeted that the top domains for the data breach include:

  • @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
  • @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
  • @yahoo.com, at 8 percent with 6,074,901 accounts.

+++++++++++++++++++++
more on Edmodo in this IMS blog
https://blog.stcloudstate.edu/ims?s=edmodo

phishing

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

L Date of Publication: 04.18.17.

https://www.wired.com/2017/04/sneaky-exploit-allows-phishing-attacks-sites-look-secure/?mbid=synd_digg

You know by now to check your browser while visiting a site to be sure it sports the little green padlock indicating TLS encryptionhttps://en.wikipedia.org/wiki/Transport_Layer_Security

 

+++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing

use of laptops phones in the classroom

Why I’m Asking You Not to / Use Laptops

++++++++++ against: ++++++++++++++++

https://blog.stcloudstate.edu/ims/2019/08/27/reading-teenagers-electronic-devices/

https://www.edsurge.com/news/2019-03-06-move-over-laptop-ban-this-professor-teaches-a-5-hour-tech-less-reading-class

research showing how laptops can be more of a distraction than a learning enabler. Purdue University even started blocking streaming websites such as Netflix, HBO, Hulu and Pandora.

But others say banning laptops can be counterproductive, arguing these devices can create opportunity for students to discover more information during class or collaborate. And that certain tools and technologies are necessary for learners who struggle in a traditional lecture format.

+++++++++++++++

Supiano, B. (2019, April 7). Digital Distraction Is a Problem Far Beyond the Classroom. But Professors Can Still Help. The Chronicle of Higher Education. Retrieved from https://www.chronicle.com/article/Digital-Distraction-Is-a/246074
Flanigan, who studies self-regulation, or the processes students use to achieve their learning goals, began researching digital distraction after confronting it in the classroom as a graduate instructor.
Digital distraction tempts all of us, almost everywhere. That’s the premise of Digital Minimalism: Choosing a Focused Life in a Noisy World by Cal Newport, an associate professor of computer science at Georgetown University.

The professor is upset. The professor has taken action, by banning laptops.
Bruff, whose next book, Intentional Tech: Principles to Guide the Use of Educational Technology in College Teaching, is set to be published this fall, is among the experts who think that’s a mistake. Why? Well, for one thing, he said, students are “going to have to graduate and get jobs and use laptops without being on Facebook all day.” The classroom should help prepare them for that.

 When Volk teaches a course with 50 or 60 students, he said, “the idea is to keep them moving.”Shifting the focal point away from the professor can help, too. “If they are in a small group with their colleagues,” Volk said, “very rarely will I see them on their laptops doing things they shouldn’t be.”
Professors may not see themselves as performers, but if they can’t get students’ attention, nothing else they do matters. “Learning doesn’t happen without attention,” said Lang, who is writing a book about digital distraction, Teaching Distracted Minds.
One aspect of distraction Lang plans to cover in his book is its history. It’s possible, he said, to regard our smartphones as either too similar or dissimilar from the distractions of the past. And it’s important, he said, to remember how new this technology really is, and how much we still don’t know about it.
++++++++++

Study: Use of digital devices in class affects students’ long-term retention of information

  • A new study conducted by researchers at Rutgers University reveals that students who are distracted by texts, games, or videos while taking lecture notes on digital devices are far more likely to have their long-term memory affected and to perform more poorly on exams, even if short-term memory is not impacted, EdSurge reports.
  • Exam performance was not only poorer for students using the devices, but also for other students in classes that permitted the devices because of the distraction factor, the study found.
  • After conducting the study, Arnold Glass, the lead researcher, changed his own policy and no longer allows his students to take notes on digital devices.
A nationally representative Gallup poll conducted in March showed that 42% of K-12 teachers feel that the use of digital devices in the classroom are “mostly helpful” for students, while only 28% feel they are “mostly harmful.” Yet 69% of those same teachers feel the devices have a harmful impact on student mental health and 55% feel they negatively affect student physical health.
 According to a 2016 study of college students, student waste about 20% of their class time for “non-class” purposes — texting, emailing, or using social media more than 11 times in a typical day. In K-12, increased dependence on digital devices often interferes with homework completion as well.
Though the new study focused on long-term retention, past studies have also shown that indicate a negative correlation between use of digital devices during class and exam scores. A 2015 study by the London School of Economics revealed that pupils in schools that banned cell phones performed better on exams and that the differences were most notable for low-performing students.
+++++++++++

By Jack Grove Twitter: @jgro_the  April 4, 2017

Using laptops in class harms academic performance, study warns. Researchers say students who use computers score half a grade lower than those who write notes

https://www.timeshighereducation.com/news/using-laptops-in-class-harms-academic-performance-study-warns

findings, published in the journal Economics of Education Review in a paper, based on an analysis of the grades of about 5,600 students at a private US liberal arts college, found that using a laptop appeared to harm the grades of male and low-performing students most significantly.

While the authors were unable to definitively say why laptop use caused a “significant negative effect in grades”, the authors believe that classroom “cyber-slacking” plays a major role in lower achievement, with wi-fi-enabled computers providing numerous distractions for students.

April 07, 2006

A Law Professor Bans Laptops From the Classroom

http://www.chronicle.com/article/A-Law-Professor-Bans-Laptops/29048

by

Classroom Confrontation Over Student’s Laptop Use Leads to Professor’s Arrest

June 02, 2006

The Fight for Classroom Attention: Professor vs. Laptop

Some instructors ban computers or shut off Internet access, bringing complaints from students http://www.chronicle.com/article/The-Fight-for-Classroom/19431

Classroom Confrontation Over Student’s Laptop Use Leads to Professor’s Arrest

http://www.chronicle.com/blogs/ticker/classroom-confrontation-over-students-laptop-use-leads-to-professors-arrest/31832

by Anne Curzahttp://www.chronicle.com/blogs/linguafranca/2014/08/25/why-im-asking-you-not-to-use-laptops/

Laptop multitasking hinders classroom learning for both users and nearby peers

http://www.sciencedirect.com/science/article/pii/S0360131512002254

March 13, 2017

The Distracted Classroom

http://www.chronicle.com/article/The-Distracted-Classroom/239446

Welcome, Freshmen. Look at Me When I Talk to You.

http://www.chronicle.com/article/Welcome-Freshmen-Look-at-Me/237751

October 28, 2015

Memorization, Cheating, and Technology. What can we do to stem the increased use of phones and laptops to cheat on exams in class?

http://www.chronicle.com/article/Memorization-Cheating-and/233926

+++++++++++++++ for +++++++++++++

intrinsic motivation:
https://blog.stcloudstate.edu/ims/2019/11/13/intrinsic-motivation-digital-distractions/

The learning experience is different in schools that assign laptops, a survey finds

The learning experience is different in schools that assign laptops, a survey finds

High schoolers assigned a laptop or a Chromebook were more likely to take notes in class, do internet research, create documents to share, collaborate with their peers on projects, check their grades and get reminders about tests or homework due dates.

+++++++++++++

https://teacheveryday.com/cellphones-in-the-classroom/

Blended Learning – the idea of incorporating technology into the every day experience of education – can save time, raise engagement, and increase student retention.

Lets face it, our students are addicted to their phones. Like…drugs addicted. It is not just a bad habit, it is hard wired in their brains(literally) to have the constant stimulation of their phones.

If you are interested in the research, there is a lot out there to read about how it happens and how bad it is.

Scientific American article published about a recent study of nomophobia – on adults (yes, many of us are addicted too).

+++++++++++
by

Best Practices for Laptops in the Classroom

http://www.chronicle.com/blogs/profhacker/best-practices-for-laptops-in-the-classroom/39064

September 11, 2016

No, Banning Laptops Is Not the Answer. And it’s just as pointless to condemn any ban on electronic devices in the classroom

http://www.chronicle.com/article/No-Banning-Laptops-Is-Not-the/237752

by

Don’t Ban Laptops in the Classroom

http://www.chronicle.com/blogs/conversation/2014/09/23/dont-ban-laptops-in-the-classroom/

Use of Laptops in the Classroom: Research and Best Practices. Tomorrow’s Teaching and Learning

https://tomprof.stanford.edu/posting/1157

By

On Not Banning Laptops in the Classroom

http://techist.mcclurken.org/learning/on-not-banning-laptops-in-the-classroom/

+++++++++++++   neutral / observation +++++++++++++++

F January 26, 2001

Colleges Differ on Costs and Benefits of ‘Ubiquitous’ Computing

http://www.chronicle.com/article/Colleges-Differ-on-Costs-and/17848

“Bring Your Own Device” Policies?

http://www.chronicle.com/blogs/profhacker/bring-your-own-device-policies/42732

June 13, 2014, 2:40 pm By Robert Talbert

Three issues with the case for banning laptops

http://www.chronicle.com/blognetwork/castingoutnines/2014/06/13/three-issues-with-the-case-for-banning-laptops/

3 Tips for Managing Phone Use in Class

Setting cell phone expectations early is key to accessing the learning potential of these devices and minimizing the distraction factor.

https://www.edutopia.org/article/3-tips-managing-phone-use-class

+++++++++++++++++++++++
more on mobile learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+learning

1 2 3 4 5 6

Skip to toolbar