podcast pontification (audio version of blog self reflections)
Greg Steinke The U
A Digital Story Assignment using WeVideo
WeVideo is the Google response to iMovie cloud
The U is on Google email and thus google drive and all other google tools
The Center for Digital Storytelling. short videos, 3-5 min incorporate photographs with the author narration, reflection
Assignment (verbal directions). process (write a 2 page script, every page is about a minute of video), gather images that support the story; edit the script (rewrite); record audio to the script (use an app on the phone instead of WeVideo), WeVideo can edit the audio recording; edit the story, edit the photos to match the story; YourTube and/or Google+
working with faculty: is the digital story a good fit for your course? two questions: does the course have many writing assignments? does everyone have to do the same type of assignment? do you want to offer choices? do you want your students to share their work outside of the class? to you want to explore opportunities for students to develop 21 century skills?
google communities for sharing
wewideo has a tutorial at Center for Digital Storytelling
students can use the digital story for their eportfolio
the entire exercise is entirely based on mobile devices
time frame: scaffolding options
3d printing products were the tangible result of the project and the digital storytelling just the format to present
Google Drive master folder for the phone images and video; iOS apps: MoviePro, FiLMc Pro, VoiceRecord Pro (including mp3); Android: WeVideo
Faculty Development Programs: Digital Storytelling Community of Practice
chemistry professor. 3D printing with different materials.
what else can be made (e.g. reaction vessel)
printing of atoms
Karen: pre-service teachers professor: how to use 3d printers and be comfortable with them. Steve Hoover. Thinkercad and Autodesk123D>
3D academy http://www.team3dacademy.com/index2.html. Pinterest board for3d Printing with resources
Lisa: graphic design. not intuitive. Rhinoceros (not free anymore). 123D strong learning curve. 3d printing will be incorporated in the curriculum. sculpture students and others don’t like fudging on the computer, but Adobe people love it. Some items takes up to 4 hours to print out. when working on the computer is difficult for some students to visualize the dimensionality.
collaborative learning opportunities.
no makerspace or fab lab. additional interest from the theater and business dept. 3d printing is connected to future work skills. new media ecology or media literacy set of skills.
the main presenter: build excitement and interest and gradually step back. how much material goes through and should we charge back. clean and maintenance involved; not too bad. better then a copier. plastic inexpensive. sizes with plastic – $25 and $50. how many project of a spool: depending on the size of the projects but considerable amount. two printers one art dept and one in the faculty dev area.
non profit visually impaired students. how 3d can make difference in special ed.
3d printing lab with access for everybody. ownership brings policy. where housed: neutral place.
only one printer is barely sufficient for faculty to figure out how to use it. purchasing two more if students and curricula to be involved.
The Balancing Act: Team-Creating an eBook as an Alternative Method for Content Delivery Tom Nechodomu, University of Minnesota
Susan Andre uses a slide titled “trust” to elucidate how the entire project was enabled. “trust” and “transparency” are sparse currency in the environment I work in. if she is right an ebook ain’t happening anytime soon at my place.
students involvement. use stipends. student artists. food for the video interviews. create a community, student centered.
people able to change the book.
copyright process; did you find it cumbersome. copyright permission center.
time span and amount of hours spent: 3-4 months per chapter.
David Wiley. Making Teaching and Learning Awesome with Open
MN Learning Commons
open educational resources
education – sharing feedback, encouragement with students passion about the discipline, yourself
open is not the same as free. free + permissions + copyright permission: 5 r = retain (make and own copies), reuse (use in a wide range of ways), revise (adapt, modify, and improve), remix (combine two or more), redistribute (share with others)
free and unfettered access
perpetual, irrevocable copyright permissions
(look but don’t touch is not open)
tech enables OER permits
traditionally copyright materials on the Internet – not so good ; jet on the road
openly copyright materials on the internet _ yes: jet in the air
permission-less innovation. relatively inexpensive and broad permissions.
intellectual infrastructure of education: learning outcomes/objectives; assessments; textbooks. they are relatively expensive and narrow permissions.
Badges can play a crucial role in the connected learning ecology by acting as a bridge between contexts, making these alternative learning channels and types of learning more viable, portable, and impactful. Badges can be awarded for a potentially limitless set of individual skills—regardless of where each skill is developed—and a collection of badges can begin to serve as a virtual résumé of competencies and qualities for key stakeholders, including peers, schools, or potential employers. Specifically, badges support capturing and communicating learning paths, signaling achievement, motivating learning, and driving innovation and flexibility, as well as building identity, reputation, and kinship. Thus, badges can provide a way to translate all types of learning into a powerful tool for getting jobs, finding communities of practice, demonstrating skills, and seeking out further learning.
Peer badges were also built around the peer-to-peer interactions and were awarded directly from one peer to another. Finally, participation badges were based on stealth assessment and data-tracking logic built into the learning environment. While the sample size was small due to constraints of the course cycles, the pilot resulted in a solid proof-of-concept of the potential for badges and these approaches to assessment.
The badges have several layers, Wisser says. While the top level signifies that you completed elements of the coursework, the badges have stripes for other accomplishments such as leading a discussion or teaching peers. “These badges are visible to other students, and if you are struggling in one area, you could turn to someone more accomplished–as shown by their badge–for help. Or if you were strong in a certain area and saw someone else was struggling, you could reach out to that person.”
students’ multimedia assignments, which lead to online resources
collaboration with other departments for the students projects
moving the class to online environment (even if kept hybrid)
What is it?
the complexity of the learning environment is turning instructional design into a more dynamic activity, responding to changing educational models and expectations. Flipped classrooms, makerspaces, and competency-based learning are changing how instructors work with students, how students work with course content, and how mastery is verified. Mobile computing, cloud computing, and data-rich repositories have altered ideas about where and how learning takes place.
How does it work?
One consequence of these changes is that designers can find themselves filling a variety of roles. Today’s instructional designer might work with subject-matter experts, coders, graphic designers, and others. Moreover, the work of an instructional designer increasingly continues throughout the duration of a course rather than taking place upfront.
Who’s doing it?
The responsibility for designing instruction traditionally fell to the instructor of a course, and in many cases it continues to do so. Given the expanding role and landscape of technology—as well as the growing body of knowledge about learning and about educational activities and assessments— dedicated instructional designers are increasingly common and often take a stronger role.
Why is it significant?
The focus on student-centered learning, for example, has spurred the creation of complex integrated learning environments that comprise multiple instructional modules. Competency-based learning allows students to progress at their own pace and finish assignments, courses, and degree plans as time and skills permit. Data provided by analytics systems can help instructional designers predict which pedagogical approaches might be most effective and tailor learning experiences accordingly. The use of mobile learning continues to grow, enabling new kinds of learning experiences.
What are the downsides?
Given the range of competencies needed for the position, finding and hiring instructional designers who fit well into particular institutional cultures can be challenging to the extent that instructors hand over greater amounts of the design process to instructional designers, some of those instructors will feel that they are giving up control, which, in some cases, might appear to be simply the latest threat to faculty authority and autonomy. My note: and this is why SCSU Academic Technology is lead by faculty not IT staff.
Where is it going?
In some contexts, instructional designers might work more directly with students, teaching them lifelong learning skills. Students might begin coursework by choosing from a menu of options, creating their own path through content, making choices about learning options, being more hands-on, and selecting best approaches for demonstrating mastery. Educational models that feature adaptive and personalized learning will increasingly be a focus of instructional design. My note: SCSU CETL does not understand instructional design tendencies AT ALL. Instead of grooming faculty to assume the the leadership role and fill out the demand for instructional design, it isolates and downgrades (keeping traditional and old-fashioned) instructional design to basic tasks of technicalities done by IT staff.
What are the implications for teaching and learning?
By helping align educational activities with a growing understanding of the conditions,
tools, and techniques that enable better learning, instructional designers can help higher education take full advantage of new and emerging models of education. Instructional
designers bring a cross-disciplinary approach to their work, showing faculty how learning activities used in particular subject areas might be effective in others. In this way, instructional
designers can cultivate a measure of consistency across courses and disciplines in how educational strategies and techniques are incorporated. Designers can also facilitate the
creation of inclusive learning environments that offer choices to students with varying strengths and preferences.
harvest students; feedback – anonymous way to ask questions. D2L surveys offer already this opportunity; Twitter and other the free options for polling apps give the same option, e.g. Polleverywhere gives a word cloud option
the follow up q/n as demonstrated is limited to 160 characters. Why?
i like that it compartmentalize the anonymity but I really ask myself: would SCSU faculty go to such length?
presumptions: non-tenured faculty is interested in the top layers students and wants to find out what works for them best. this loaded, since, if there ARE different learning styles, then what worked for the top layer might be exactly what did not work for the bottom layer, but this approach will gave the faculty a justification to keep stratifying students, instead of thinking of diverse ways to approach all layers. this part of sale, not pedagogy. sorry.
weakness; the entire presentation is trying to sell a product, which might be good for different campus, but not for SCSU, where faculty are overworked, the class load is so great that going to such details might be questionable.
exporting CSV for data massaging is not big deal. indeed the easy of this particular software is admirable, but if the faculty has time to go into such details, they can export the data from D2L or Google Forms and open it in SPSS
Greg’s question: mobility.
libraries and services. pole users without being tied to course. again, that all can be done with other services in the library. if the library cares about it at all.
Kvenild, C., & Calkins, K. (2011). Embedded Librarians: Moving Beyond One-Shot Instruction – Books / Professional Development – Books for Academic Librarians – ALA Store. ACRL. Retrieved from http://www.alastore.ala.org/detail.aspx?ID=3413
xi. the authors are convinced that LMS embedded librarianship is becoming he primary and most productive method for connecting with college and university students, who are increasingly mobile.
xii. reference librarians engage the individual, listen, discover what is wanted and seek to point the stakeholder in profitable directions.
Instruction librarians, in contrast, step into the classroom and attempt to lead a group of students in new ways of searching wanted information.
Sometimes that instruction librarian even designs curriculum and teaches their own credit course to guide information seekers in the ways of finding, evaluating, and using information published in various formats.
Librarians also work in systems, emerging technologies, and digital initiatives in order to provide infrastructure or improve access to collections and services for tend users through the library website, discovery layers, etc. Although these arenas seemingly differ, librarians work as one.
xiii. working as an LMS embedded librarian is both a proactive approach to library instruction using available technologies and enabling a 24/7 presence.
1. Embeddedness involves more that just gaining perspective. It also allows the outsider to become part of the group through shared learning experiences and goals. 3. Embedded librarianship in the LMS is all about being as close as possible to where students are receiving their assignments and gaining instruction and advice from faculty members. p. 6 When embedded librarians provide ready access to scholarly electronic collections, research databases, and Web 2.0 tools and tutorials, the research experience becomes less frustrating and more focused for students. Undergraduate associate this familiar online environment with the academic world.
p. 7 describes embedding a reference librarian, which LRS reference librarians do, “partnership with the professor.” However, there is room for “Research Consultations” (p. 8). While “One-Shot Library Instruction Sessions” and “Information Literacy Credit Courses” are addressed (p. 809), the content of these sessions remains in the old-fashioned lecturing type of delivering the information.
p. 10-11. The manuscript points out clearly the weaknesses of using a Library Web site. The authors fail to see that the efforts of the academic librarians must go beyond Web page and seek how to easy the information access by integrating the power of social media with the static information residing on the library web page.
p. 12 what becomes disturbingly clear is that faculty focus on the mechanics of the research paper over the research process. Although students are using libraries, 70 % avoid librarians. Urging academic librarians to “take an active role and initiate the dialogue with faculty to close a divide that may be growing between them and faculty and between them and students.”
Four research context with which undergraduates struggle: big picture, language, situational context and information gathering.
p. 15 ACRL standards One and Three: librarians might engage students who rely on their smartphones, while keeping in mind that “[s]tudents who retrieve information on their smartphones may also have trouble understanding or evaluating how the information on their phone is ‘produced, organized, and disseminated’ (Standard One). Standard One by its definition seems obsolete. If information is formatted for desktops, it will be confusing when on smart phones, And by that, it is not mean to adjust the screen size, but change the information delivery from old fashioned lecturing to more constructivist forms. e.g. http://web.stcloudstate.edu/pmiltenoff/bi/
p. 15 As for Standard Two, which deals with effective search strategies, the LMS embedded librarian must go beyond Boolean operators and controlled vocabulary, since emerging technologies incorporate new means of searching. As unsuccessfully explained to me for about two years now at LRS: hashtag search, LinkedIn groups etc, QR codes, voice recognition etc.
p. 16. Standard Five. ethical and legal use of information.
p. 23 Person announced in 2011 OpenClass compete with BB, Moodle, Angel, D2L, WebCT, Sakai and other
p. 24 Common Features: content, email, discussion board, , synchronous chat and conferencing tools (Wimba and Elluminate for BB)
p. 31 information and resources which librarians could share via LMS
– post links to dbases and other resources within the course. LIB web site, LibGuides or other subject-related course guidelines
– information on research concepts can be placed in a similar fashion. brief explanation of key information literacy topics (e.g difference between scholarly and popular periodical articles, choosing or narrowing research topics, avoiding plagiarism, citing sources properly whining required citations style, understanding the merits of different types of sources (Articles book’s website etc)
– Pertinent advice the students on approaching the assignment and got to rheank needed information
– Tutorials on using databases or planning searches step-by-step screencast navigating in search and Candida bass video search of the library did you a tour of the library
p. 33 embedded librarian being copied on the blanked emails from instructor to students.
librarian monitors the discussion board
p. 35 examples: students place specific questions on the discussion board and are assured librarian to reply by a certain time
instead of F2F instruction, created a D2L module, which can be placed in any course. videos, docls, links to dbases, links to citation tools etc. Quiz, which faculty can use to asses the the students
p. 36 discussion forum just for the embedded librarian. for the students, but faculty are encouraged to monitor it and provide content- or assignment-specific input
video tutorials and searching tips
Contact information email phone active IM chat information on the library’s open hours
p. 37 questions to consider
what is the status of the embedded librarian: T2, grad assistant
p. 41 pilot program. small scale trial which is run to discover and correct potential problems before
One or two faculty members, with faculty from a single department
Pilot at Valdosta State U = a drop-in informatil session with the hope of serving the information literacy needs of distance and online students, whereas at George Washington U, librarian contacted a distance education faculty member to request embedding in his upcoming online Mater’s course
p. 43 when librarians sense that current public services are not being fully utilized, it may signal that a new approach is needed.
pilots permit tinkering. they are all about risk-taking to enhance delivery
p. 57 markeing LMS ebedded Librarianship
library collections, services and facilities because faculty may be uncertain how the service benefits their classroom teaching and learning outcomes. my note per
“it is incumbent upon librarians to promote this new mode of information literacy instruction.” it is so passe. in the times when digital humanities is discussed and faculty across campus delves into digital humanities, which de facto absorbs digital literacy, it is shortsighted for academic librarians to still limit themselves into “information literacy,” considering that lip service is paid for for librarians being the leaders in the digital humanities movement. If academic librarians want to market themselves, they have to think broad and start with topics, which ARE of interest for the campus faculty (digital humanities included) and then “push” their agenda (information literacy). One of the reasons why academic libraries are sinking into oblivion is because they are sunk already in 1990-ish practices (information literacy) and miss the “hip” trends, which are of interest for faculty and students. The authors (also paying lip services to the 21st century necessities), remain imprisoned to archaic content. In the times, when multi (meta) literacies are discussed as the goal for library instruction, they push for more arduous marketing of limited content. Indeed, marketing is needed, but the best marketing is by delivering modern and user-sought content.
the stigma of “academic librarians keep doing what they know well, just do it better.” Lip-services to change, and life-long learning. But the truth is that the commitment to “information literacy” versus the necessity to provide multi (meta) literacites instruction (Reframing Information Literacy as a metaliteracy) is minimizing the entire idea of academic librarians reninventing themselves in the 21st century.
Here is more: NRNT-New Roles for New Times
p. 58 According to the Burke and Tumbleson national LMS embedded librarianship survey, 280 participants yielded the following data regarding embedded librarianship:
traditional F2F LMS courses – 69%
online courses – 70%
hybrid courses – 54%
undergraduate LMS courses 61%
graduate LMS courses 42%
of those respondents in 2011, 18% had the imitative started for four or more years, which place the program in 2007. Thus, SCSU is almost a decade behind.
library blog was offered numerous times to the LRS librarians and, consequently to the LRS dean, but it was brushed away, as were brushed away the proposals for modern institutional social media approach (social media at LRS does not favor proficiency in social media but rather sees social media as learning ground for novices, as per 11:45 AM visit to LRS social media meeting of May 6, 2015). The idea of the blog advantages to static HTML page was explained in length, but it was visible that the advantages are not understood, as it is not understood the difference of Web 2.0 tools (such as social media) and Web 1.0 tools (such as static web page). The consensus among LRS staff and faculty is to keep projecting Web 1.0 ideas on Web 2.0 tools (e.g. using Facebook as a replacement of Adobe Dreamweaver: instead of learning how to create static HTML pages to broadcast static information, use Facebook for fast and dirty announcement of static information). It is flabbergasting to be rejected offering a blog to replace Web 1.0 in times when the corporate world promotes live-streaming (http://www.socialmediaexaminer.com/live-streaming-video-for-business/) as a way to promote services (academic librarians can deliver live their content)
p. 59 Marketing 2.0 in the information age is consumer-oriented. Marketing 3.0 in the values-driven era, which touches the human spirit (Kotler, Katajaya, and Setiawan 2010, 6).
The four Ps: products and services, place, price and promotion. Libraries should consider two more P’s: positioning and politics.
Mathews (2009) “library advertising should focus on the lifestyle of students. the academic library advertising to students today needs to be: “tangible, experiential, relatebale, measurable, sharable and surprising.” Leboff (2011, p. 400 agrees with Mathews: the battle in the marketplace is not longer for transaction, it is for attention. Formerly: billboards, magazines, newspapers, radio, tv, direct calls. Today: emphasize conversation, authenticity, values, establishing credibility and demonstrating expertise and knowledge by supplying good content, to enhance reputation (Leboff, 2011, 134). translated for the embedded librarians: Google goes that far; students want answers to their personal research dillemas and questions. Being a credentialed information specialist with years of experience is no longer enough to win over an admiring following. the embedded librarian must be seen as open and honest in his interaction with students.
p. 60 becoming attractive to end-users is the essential message in advertising LMS embedded librarianship. That attractivness relies upon two elements: being noticed and imparting values (Leboff, 2011, 99)
p. 61 connecting with faculty
p. 62 reaching students
attending a synchronous chat sessions
watching a digital tutorial
posting a question in a discussion board
using an instant messaging widget
be careful not to overload students with too much information. don’t make contact too frequently and be perceived as an annoyance and intruder.
p. 65. contemporary publicity and advertising is incorporating storytelling. testimonials differ from stories
p. 66 no-cost marketing. social media
low-cost marketing – print materials, fliers, bookmarks, posters, floor plans, newsletters, giveaways (pens, magnets, USB drives), events (orientations, workshops, contests, film viewings), campus media, digital media (lib web page, blogs, podcasts, social networking cites
p. 69 Instructional Content and Instructional Design
p. 70 ADDIE Model
Analysis: the requirements for the given course, assignments.
Ask instructors expectations from students vis-a-vis research or information literacy activities
students knowledge about the library already related to their assignments
which are the essential resources for this course
is this a hybrid or online course and what are the options for the librarian to interact with the students.
due date for the research assignment. what is the timeline for completing the assignment
when research tips or any other librarian help can be inserted
copy of the syllabus or any other assignment document
p. 72 discuss the course with faculty member. Analyze the instructional needs of a course. Analyze students needs. Create list of goals. E.g.: how to find navigate and use the PschInfo dbase; how to create citations in APA format; be able to identify scholarly sources and differentiate them from popular sources; know other subject-related dbases to search; be able to create a bibliography and use in-text citations in APA format
p. 74 Design (Addie)
the embedded component is a course within a course. Add pre-developed IL components to the broader content of the course. multiple means of contact information for the librarians and /or other library staff. link to dbases. link to citation guidance and or tutorial on APA citations. information on how to distinguish scholarly and popular sources. links to other dbases. information and guidance on bibliographic and in-text citations n APA either through link, content written within the course a tutorial or combination. forum or a discussion board topic to take questions. f2f lib instruction session with students
p. 76 decide which resources to focus on and which skills to teach and reinforce. focus on key resources
p. 77 development (Addie).
-building content;the “landing” page at LRS is the subject guides page. resources integrated into the assignment pages. video tutorials and screencasts
-finding existing content; google search of e.g.: “library handout narrowing topic” or “library quiz evaluating sources,” “avoiding plagiarism,” scholarly vs popular periodicals etc
-writing narrative content. p. 85
p. 87 Evaluation (Addie)
formative: to change what the embedded librarian offers to improve h/er services to students for the reminder of the course
summative at the end of the course:
p. 89 Online, F2F and Hybrid Courses
p. 97 assessment impact of embedded librarian.
what is the purpose of the assessment; who is the audience; what will focus on; what resources are available
p. 98 surveys of faculty; of students; analysis of student research assignments; focus groups of students and faculty
Integers: A signed or unsigned whole number running from -32,768 to 32,768 or from 0 to 65,535 if not signed. Integers are used anytime something needs to be counted.
Long Integer: Any whole number outside the above range. Python doesn’t distinguish between the two though many languages do. Practically, Python’s integers range from −2,147,483,648 to 2,147,483,648 or 0 to 0 to 4,294,967,295. Most of us will be very happy with this many whole numbers to choose from.
Real and Floating Point Numbers: Real numbers are signed or unsigned numbers including decimals. The numbers 2,3,4 are Integers and Real Numbers. The numbers 2.1, 2.9,3.9 are Real Numbers, but not Integers. Real Numbers can include representations of irrational numbers such as pi. Real numbers must be rational, that is a decimal number that terminates after a finite number of decimals. You will sometimes encounter the term Floating Point Numbers. This is a technical term referring to the way that large Real Numbers are represented in a computer. Python hides this detail from you so Real and Floating Point are used intercangeably in this language.
Binary Numbers: And Octal and Hexadecimal. These are numbers used internally by computers. You will run into these values fairly often. For instance, when you see color values in HTML such as “FFFFFF” or “0000FF”,
Hexadecimal and Octal are used because humans can read them without too much trouble and they are compromise between what computers process and what we can read. Any time you see something in Octal or Hexadecimal, you are looking at something that interfaces with the lower levels of a computer. You will most commonly use Hexadecimal numbers when dealing with Unicode character encodings. Python will interpret any number which begins with a leading zero as binary unless formatting commands have been used.
Numbers such as 7i are referred to as complex. They have a real part, the 7, and an imaginary part, i. Chance are you won’t use complex numbers unless you’re working with scientific data.
A String consists of a sequence of characters. The term String refers to how this data type is represented internally. You store text in Strings. Text can by anything, letters, words, sentences, paragraphs, numbers, just about anything.
Lists are close cousins to Strings, though you may never need to think of them that way. A list is just that, a list of things. Lists may contain any number of numbers or any number of strings. List may even contain any number of other lists. Lists are compared to arrays, but they are not the same thing. In most uses, the function the same so the difference, for our purposes, is moot. Strings are like lists in that, internally, the computer works with strings in an identical manner to lists. This is why the operations on Strings are so different from numbers.
The last main data type in the Python programming language is the dictionary. Dictionaries are map types, known in other languages as hashes, and in computer science as Associative Arrays. The best way to think of what the dictionary does is to consider a Library of Congress Call Number(something this audience is familiar with). The call number is what’s called a Key. It connects to a record which contains information about a book. The combination of keys and records, called values, comprises a dictionary. A single key will connect to a discrete group of values such as the items in this record. Dictionaries will be touched on in the next lesson in some detail in the next course. These are fairly advanced data structures and require a solid understanding a programming fundamentals in order to be used properly.
Statements, an Overview
Programs consist of statements. A statement is a unit of executable code. Think of a statement like a sentence. In a nutshell, statements are how you do things in a program. Writing a program consists of breaking down a problem you want to solve into smaller pieces that you can represent as mathematical propositions and then solve. The statement is where this process gets played out. Statements themselves consist of some number of expressions involving data. Let’s see how this works.
An expression would be something like 2+2=4. This expression, however is not a complete statements. Ask Python to evaluate it and you will get the error “SyntaxError: can’t assign to operator”. What’s going on here? Basically we didn’t provide a complete statement. If we want to see the sum of 2+2 we have to write a complete statement that tells the interpreter what to do and what to do it with. The verb here is ‘print’ and the object is ‘2+2’. Ask Python to evaluate ‘print 2+2’ and it will show ‘4’. We could also throw in subject and do something a bit more detailed: ‘Sum=2+2’. In this case we are assigning the value of 2+2 to the variable, Sum. We can then do all sorts of things with Sum. We can print it. We can add other numbers to it, hand it off to a function and so on. For instance, might want to know the root of Sum. In which case we might write something like ‘print sqrt(sum)’ which will display ‘2’.
A shell is essentially a user interface that provides you access to a system’s features. Normally, this means access to an Operating System. In cases like this, the shell provides you access to the Python programming environment.
Anything preceed by a “#” is not interpreted or executed by the programming shell. Comments are used widely to document programs. One school of programming holds that code should be so clear that comments are uncessary.
Operations on Numbers
Expressions are discrete statements in programming that do something. They typically occupy one line of code, though programmers will sometimes squeeze more in. This is generally bad form and can really make your program a mess. Expressions consist of operations and data or rather data and operations on them. So, what can you do with numbers? Here is a concise list of the basic operations for integers and real numbers of all types:
Addition: z= x + y
Subtraction: z = x – y
Multiplication: z = x * y. Here the asterisk serves as the ‘X’ multiplication symbol from grade school.
Division: z = x/y. Division.
Exponents: z = x ** y or xy, x to the y power.
Operations have an order of precedence which follows the algebraic order of precedence. The order can be remembered by the old Algebra mnenomic, Please Excuse My Dear Aunt Sally which is remeinds you that the order of operations is:
Operations on Strings
Strings are strange creatures as I’ve noted before. They have their own operations and the arithmetic operations you saw earlier don’t behave the same way with strings.
Putting Expressions Together to Make Statements
As I noted earlier, all computer languages, and natural languages, possess pragmatics, larger scale structures which reduce ambiguity by providing context. This is a fancy way of saying just as sentences posses rules of syntax to make able to be comprehended, larger documents have similar rules. Computer Programs are no different. Here’s a break down of the structure of programs in Python, in a general sense.
Programs consist of one or more modules.
Modules consist of one or more statements.
Statements consist of one or more expressions.
Expressions create and/or manipulate objects(and variables of all kinds).
Modules and Programs are for the next class in the series, though we will survey these larger structures next lesson. For now, we’ll focus on statements and expressions. Actually, we’ve already started with expressions above. In Python, statements can do three things.
Assign a variable
Change a variable
Take an action
Variable Names and Reserved Words
Now that we’ve seen some variable assignments, let’s talk about best practices. First off, aside from reserved words, variable names can be almost any combination of letters, numbers and punctuation marks. You, however, should never ever, use the following punctuation marks in variable names:
These punctuation marks tends to be operators and characters that have special meanings in most computer languages. The other issue is reserved words. What are “reserved words”? They are words that Python interprets as commands. Pythons reservers the following words.:
True: A special value set aside for boolean values
False: The other special value set aside for boolean vaules
None: The logical equivalent of 0
and: a way of combining logical conditions
as: describes how modules are imported
assert: a way of forcing something to take on a certain value. Used in debugging of large programs
break: breaks out of a loop and goes on with the rest of the program
class: declares a class for object oriented design. For now, just remember not to use this variable name
continue: returns to the top of the loop and keeps on going again
def: declares functions which allow you to modularize your code.
elif: else if, a cotnrol structure we’ll see next lesson
else: as above
except: another control structure
finally: a loop control structure
for: a loop control structure
from: used to import modules
global: a scoping statement
if: a control structure/li>
in: used in for each loops
is: a logical operator
lamda: like def, but weird. It defines a function in a single line. I will not teach this becuase it is icky. If you ever learn Perl you will see this sort of thing a lot and you will hate it, but that’s just my personal opinion.
nonlocal: a scoping command
not: a logical operator
or: another logical operator
pass: does nothing. Used as placeholder
raise: raises an error. This is used to write custom error messages. Your programs may have conditions which would be considered invalid based on our business situation. The interpreter may not consider them errors, but you might not want your user to do something so you ‘raise’ an exception and stop the program.
return: tells a function to return a value
try: this is part of an error testing statement
while: starts a while loop
with: a context manager. This will be covered in the course after the next one in this series
yield: works like return
Variable names should be meaningful. Let’s say I have to track a person’s driver license number. explanatory names like ‘driverLicenseNumber’.
Use case to make your variable names readable. Python is case sensitive, meaning a variable named ‘cat’ is different from named ‘Cat’. If you use more than one word to name variable, start of lower case the change case on the second word. For instance “bigCats = [‘Tiger’,’Lion’,’Cougar’, ‘Desmond’]”. The common practice used by programmers in many settings is that variables start with lowercase and functions(methods and so on) start with upper case. This is called “Camel Case” for its lumpy, the humpy appearance. Now, as it happens, there is something of a religious debate over this. Many Python programmers prefer to keep everything lower case and join words in a name by underscores such as “big_cats”. Use whichever is easiest or looks the nicest to you.
Variable names should be unique. Do not reuse names. This will cause confusion later on.
Python conventions. Python, as with any other programming language, has culture built up around it. That means there are some conventions surrounding variable naming. Two leading underscores, __X, denote system variables which have special meaning to the interpreter. So avoid using this for your own variables. There may be a time and place, but that’s for an advanced prorgramming course. A single underscore _X indicates to other programmers that this a fundamental variable and that they mess with it at their own peril.
Avoid starting variable names with a number. This may or may not return an error. It can also mislead anyone reading your program.
“A foolish consistency is the hobgoblin of little minds”. But not to programming minds. Consistency helps the readability of code a great deal. Once you start a system, stick with it.
Putting together valid statements can be a little hard at first. There’s a grammar to them. Thus far, we’ve mainly been workign with expressions such as “x = x+1”. You can think of expression as nouns. We’ve clearly defined x, but how do we look inside? For that we need to give it a verb, the print command. We would then write “print x”. However we can skip the middle statement and print an expression such as “print x + 1”. The interpreter evaluates this per the order of operations I laid out earlier. However, once that expression is evaluated, it then applies the verb, “print”, to that expression.
Print is a function that comes with the Python distribution. There are many more and you can create your own. We’ll cover that a bit in next lesson. Let’s look at little more at the grammar of a statement. Consider:
x = sin(b)
Assume that b has been defined elsewhere. x is the subject, b is the object and sin is the verb. Python will go to the right side of the equal sign first. It will then go to the inside of the function and evaluate what’s there first. It then evaluates the value of the function and finishes by setting x to that value. What about something like this?
Python evaluates from the inside out according to the rules of operation. Very complex statements can be built up this way.
x = sin(log((x + 3)/(e**2)))
Regardless of what this expression evaluates to (I don’t actually know), Python starts with the innermost parentheses, then works through the value of e squared then adds 3 to x and divides the result by e squared. With that worked out, it takes the logarithm of the result and takessthe sine of that before setting x to the final result.What you cannot do is execute more than one statement on a line. No more than one verb on a line. In this context, a verb is an assignment, or a command acting on an expression
Call up your copy of Think Python or go to the website at http://www.greenteapress.com/thinkpython/html/. Read Chapter 2. This will reiterate much of what I’ve presnted here, but this will help cement the content into you minds. Skip section 2.6 because IPython treats everything as script mode. IPyton provides you with the illusion of interactive, but everything happens asynchronously. This means that any action you type in will not instantaneously resolve as it would if you were running Python interactively on your computer. You will have to use print statements to see the results of your work.
Your assignment consists of the following:
Exercise 1 from Chapter 2 of Think Python. If you type an integer with a leading zero, you might get a confusing error:
<<< zipcode = 02492
SyntaxError: invalid token
Other numbers seem to work, but the results are bizarre:
<<< zipcode = 02132
Can you figure out what is going on? Hint: display the values 01, 010, 0100 and 01000.
Exercise 3 from Chapter 2 of Think Python.Assume that we execute the following assignment statements:
width = 17
height = 12.0
delimiter = ‘.’
For each of the following expressions, write the value of the expression and the type (of the value of the expression).
1 + 2 5
Exercise 4 from Capter 2 of Think Python. Practice using the Python interpreter as a calculator:
1. The volume of a sphere with radius r is 4/3 π r3. What is the volume of a sphere with radius 5? Hint: 392.7 is wrong!
2. Suppose the cover price of a book is $24.95, but bookstores get a 40% discount. Shipping costs $3 for the first copy and 75 cents for each additional copy. What is the total wholesale cost for 60 copies?
3/ If I leave my house at 6:52 am and run 1 mile at an easy pace (8:15 per mile), then 3 miles at tempo (7:12 per mile) and 1 mile at easy pace again, what time do I get home for breakfast?
In your IPython notebook Create a markdown cell and write up your exercise in there. Just copy it from the textbook or from the above write up. Next ceate a code cell and do your work in there. Please, comment your work thoroughly. You cannot provide too many comments. Use print statements to see the outcome of your work.
there are two type of universities: the ones that are in control of change and the ones, which are pressed to change.
what kind of education is needed at this moment of history.
Assumptions: 5-10 years will be for a first time outcompeted in terms of delivering information and degrees. What is that the university can do distinctively well that WWW cannot do: mentored learning and the arc of learning (beyond collection of granular separate learning)
learning analytics. adaptive learning, intelligent tutoring etc. Open Learning Initative. http://oli.cmu.edu/
In the 19th century, railroads companies which were in the business of railroad companies went under; the ones which were in the business of transportation survived. Parallel, universities, which are in the business of delivering information will die out; the ones, which will survive must look to a very different picture.
partners across campus for IT/AV: CETL
What is the most important key for creating active learning spaces (ALS).
Mathew shared his work with CETL and his understanding of the importance of faculty being brought to the table. Faculty as equal stakeholder in the process.
In a conversation with him after the presentation, he agreed that faculty must be the leading force in in generating ideas what new technology and how to implement technology in the classroom. He agreed that at the present IT/AV staff is the leading force and this is a corrupt statuquo
faculty and academic affairs, students, facilities, architects, engineers, contractors, furniture vendors, IT (networking, support instructional design)
challanges: ITS mindset (conservative), Administration must be on board (money), Funding.
MnSCU is not Google friendly. 60% of the staff is not doing the same tasks as 3 years ago.
Open about challenges, sharing more with faculty. Nice to hear this, but the communication must be much larger, to the point when faculty are equal partners in a relationship, which is not far from equal decision making.
If faculty is not considered a REAL stakeholder (versus intimated body in a meeting which is controlled by IT people), the entire technology use goes down the drain. Faculty is much stronger relationship with students then IT is with students. The presentation put weight on IT staff and its connection with students’ needs. It is questionable how IT staff can make stronger connection then faculty, who are in a daily contact with students.
The issue is how to assist faculty to catch up with the technology, not how IT staff to rival faculty in their connection with students. What faculty lacks in understanding of technology cannot be replaced by IT staff increasing interaction with students, but rather assisting faculty with coming to terms with technology.
maintaining innovation: fail fast and fail forward; keep up to date with technology (blank statement); always look for new furniture; focus on space design instead of just A/V; Challenge yourself with new ideas; always learn from your mistakes; always get feedback from students and faculty (again, the PERIPHERAL role of faculty. Is feedback all expected from faculty? It faculty and IT staff must be equal partners at the decision table. not faculty being consulted at decision made by IT staff)
Google Glass mentioned, Pebble watches. supposedly to understand students habits. Big data used to profiling students is very fashionable, but is it the egg in the basket?
they have 3d printer, Inoculus. Makerspace mentioned
examples how to use 3d printing for education (LRS archive collections, MN digital library).
the presenter kept asking if there are questions. it makes me wonder how far back (pedagogically or androgogically) IT staff must be to NOT consider backchanneling. Social media is not a novelty and harvesting opinions and questions using social media should not be neglected
digital classroom breakdown session
Break down session: Digital Classroom
technical, very IT. I am not versed enough to draw impression on how it projects over real faculty work. HDMI cables.
relating to the previous presentation: I really appreciate the IT / AV staff handling all this information, which is complex and important; but during my 15 years tenure at SCSU I learned to be suspicious of when the complexity and the importance of the techy matter starts asserting itself as leading when the pedagogy in the classroom is determined.
HD flow and other hardware and software solutions
VLAN 3. lecture capture.
BYOD support in the classroom: about half of the room raised their hands.
News media material published online is an important first draft of history as the printed newspaper and broadcast news has been and still is. The digital transformation of news multiplies the usage and current online news media constantly develop new channels and modes of communication, redefine the roles of all stakeholders and transform the news in an infinite process.
The IFLA 2015 International News Media Conference 15-16 April 2015 has as its focus the transformation aspects of born digital news media and the implications for long term archiving and access, including issues of e-legal deposit of online news media and long term access to and preservation of news databases, web harvesting of online news media and user experiences with born digital news media collections.
Registration fee is 95 Euros and includes Evening reception 14 April, Light lunches 15-16 April and Dinner 15 April. The detailed programme will be posted on the conference web site and will include speakers from all over the world and tours of the library.
Organizers of the conference are IFLA News Media (Newspapers) Section.
The day before and in conjunction with the conference, April 14, the Center for Research Libraries (Chicago, USA;http://www.crl.edu/) will hold an International Newspaper Archiving and Digitization Summit with major actors in the newspaper digitization community to consider a strategic, cooperative approach to future digitization efforts of the world’s legacy news collections.)
For further information about the conference, please contact: Pär Nilsson (email: firstname.lastname@example.org, ph: +46 10 709 34 04) Karl Isaksson (email: email@example.com, ph: +46 10 709 36 34)