If you go to the Facebook Live Map and browse the live feeds, you’ll often see people talking about nothing in particular, with unflattering close-up camera angles and scratchy audio. People often shift their phones from hand to hand when they tire of holding them, and brush the mic without realizing it.
#2: Invest in a Mobile Phone Setup Budget: $150-$300
iPhone Setup When choosing a mount for an iPhone, consider the iOgrapher ($60), shown below. Attach the 37mm wide angle lens ($40) if you want to get more people or surroundings in the video. Android and Windows Phone Setup The Saramonic SmartMixer ($149) fits any phone (including the iPhone) and incorporates both audio and video stabilization in one piece of gear. The mics are stereo, and you can angle them however you want to capture multiple people talking.
#3: Broadcast From Your Desktop
Budget: Free-$600 Going live from your computer allows you to bring in guests to interview, add pre-recorded video, graphics, titles (so people know who the hosts are), and more.
You can use the built-in camera on your computer or a USB camera, like the Logitech C920 ($99).
OBS OBS (Open Broadcaster Software) is open-source software, which means it’s available for free.
OBS is a great option, but it doesn’t have all of the bells and whistles of paid software to make it intuitive or easy to use. You’ll need to do a bit of setup and testing before you go live.
Wirecast Wirecast ($495) has been around for years and has come a long way in the last few months as Facebook Live has exploded in popularity. The interface is a little more intuitive than OBS, but still requires some setup and experimentation.
We conducted a short 5 min live session on Facebook Live and Periscope; the first of three mini-series to test the potential of these tools for academic purposes:
Here is the link to the LITA Webinar Facebook Group page: https://www.facebook.com/groups/LitaSocialMediaWebinar/
Do yourself a favour and click the “People you may know” button and pick something you like that has a little more respectability to it. The same applies for avatars and pictures with someone else other than you in them.
2. A professional headline that is anything but.
Use a description that is both accurate and related to either the benefit you provide or your title within your company. Either way, this is guaranteed to return your profile in some searches.
3. Shameless friend collecting.
It’s a bad first impression. Give people a reason to connect with you and start off on the right foot.
4. Not even really wanting to be friends.
What do you do with all those connections? Do you actively keep in touch? What do you do when you get a message from a contact about business? Do you tut, sigh and ignore them? Fly into a rant about people contacting you on LinkedIn to talk business opportunities?
5. Going all “selly sell” right off the bat.
Do you send spam messages? The LinkedIn inbox delivers into your recipient’s inbox. It might be a warmer and softer way to get noticed but there is no relationship. Better to create rapport by asking questions, sharing content, joining the same group and showing your expertise and counselling side there.
6. Joining groups and not getting involved.
If you join groups and then don’t contribute, you’re partially responsible for the failure of the group. Quickest remedy is to set your group digest emails to once weekly and comment on a few discussions once a week when your email lands.
7. Liking and commenting on absolutely everything.
Liking and commenting on everything works well on Facebook and gives your friends a vanity boost but on LinkedIn less so. Think of it as being at that networking event and you’re the loud self absorbed guy no-one wants to talk to. Not quite so appealing?
8. Sending tweets directly into LinkedIn.
The automatic #in from Twitter was removed several years ago but it doesn’t stop the socially savvy copying and pasting or using a third party like Hootsuite to update multiple platforms at the same time. I do this but do try to tailor the messages to not include @ and #. Are your tweets even relevant to your LinkedIn audience? You’ll see they might jar after a while.
9. Asking people you barely know for endorsements and testimonials.
It’s a bit like asking your Facebook page to be liked but actually more vulgar because they haven’t presumably sampled your expertise yet.
10. Insharing Richard Branson’s (and other influencer) updates.
OK, it’s not Richard’s fault, but my point is, I often get to see what Richard and many others have to see a hundred times in my feed thanks to this piece of functionality. It’s got to Facebook like proportions.
When hundreds of people do the obvious, have the bottle to stay true to yourself and go your own way.
When it comes to social networks, teens are even more committed to Instagram. But the most stunning statistic was that Facebook seems to be rapidly disappearing from teen’s lives. In April, 72 percent said they used the site. Now, a mere 45 percent admitted to it.
Student-centered learning theory and practice are based on the constructivist learning theory that emphasizes the learner’s critical role in constructing meaning from new information and prior experience.
The “context”in this definition encompasses m-learnng that is formalself-directed, and spontaneous learning, as well as learning that is context aware and context neutral.
therefore, m-learning can occur inside or outside the classroom, participating in a formal lesson on a mobile device; it can be self-directed, as a person determines his or her own approach to satisfy a learning goal; or spontaneous learning, as a person can use the devices to look up something that has just prompted an interest (Crompton, 2013, p. 83). (Gaming article Tallinn)Constructivist Learnings in the 1980s – Following Piage’s (1929), Brunner’s (1996) and Jonassen’s (1999) educational philosophies, constructivists proffer that knowledge acquisition develops through interactions with the environment. (p. 85). The computer was no longer a conduit for the presentation of information: it was a tool for the active manipulation of that information” (Naismith, Lonsdale, Vavoula, & Sharples, 2004, p. 12)Constructionist Learning in the 1980s – Constructionism differed from constructivism as Papert (1980) posited an additional component to constructivism: students learned best when they were actively involved in constructing social objects. The tutee position. Teaching the computer to perform tasks.Problem-Based learning in the 1990s – In the PBL, students often worked in small groups of five or six to pool knowledge and resources to solve problems. Launched the sociocultural revolution, focusing on learning in out of school contexts and the acquisition of knowledge through social interaction
Socio-Constructivist Learning in the 1990s. SCL believe that social and individual processes are independent in the co-construction of knowledge (Sullivan-Palinscar, 1998; Vygotsky, 1978).
96-97). Keegan (2002) believed that e-learning was distance learning, which has been converted to e-learning through the use of technologies such as the WWW. Which electronic media and tools constituted e-learning: e.g., did it matter if the learning took place through a networked technology, or was it simply learning with an electronic device?
Share with us practical examples of applying constructivist approach in your class
Would one hour workshop on turning existing class assignments into constructivist-based class assignments be of interest for you?
how data is produced, collected and analyzed. make accessible all kind of data and info
ask good q/s and find good answers, share finding in meaningful ways. this is where digital literacy overshadows information literacy and this the fact that SCSU library does not understand; besides teaching students how to find and evaluate data, I also teach them how to communicate effectively using electronic tools.
connecting people tools and resources and making it easier for everybody. building collaborative, open and interdisciplinary
robust data computational literates. developing workshops, project and events to practice new skills. to position the library as the interdisciplinary nexus
what are data: definition. items of information, facts, traces of content and form. higher level, conception discussion about data in terms of social effects: matadata capturing information about the world, social political and economic changes. move away the mystic conceptions about data. nothing objective about data.
the emergence of IoT – digital meets physical. cyber physical systems. smart objects driven by industry. . proliferation of sensor and device – smart devices.
what does privacy looks like ? what is netneutrality when IoT? library must restructure : collaborate across institutions about collections of data in opien and participatory ways. put IoT in the hands of make and break things (she is maker space aficionado)
make and break things hackathons – use cheap devices such as Arduino and Pi.
data literacy programs with higher level conception exploration; libraries empower the campus in data collection. data science norms, store and share data to existing repositories and even catalogs. commercial services to store and connect data, but very restrictive and this is why libraries must be involved.
linked data and dark data
linked data – draw connections around online data most of the data are locked. linked data uses metadata to link related information in ways computers can understand.
libraries take advantage of link data. link data opportunity for semantics, natural language processing etc. if hidden data is relative to our communities, it is a library responsibility to provide it. community data practitioners
massive data, which cannot be analyzed by relational processing. data not yield significant findings. might be valuable for researchers: one persons trash is another persons’ treasure. preserving data and providing access to info. collaborate with researchers across disciplines and assist decide what is worth keeping and what discarding and how to study.
rich learning experience working with lined and dark data enable fresh perspective and learning how to work with data architecture. data literacy programming.
In the age of Big Data, there is an abundance of free or cheap data sources available to libraries about their users’ behavior across the many components that make up their web presence. Data from vendors, data from Google Analytics or other third-party tracking software, and data from user testing are all things libraries have access to at little or no cost. However, just like many students can become overloaded when they do not know how to navigate the many information sources available to them, many libraries can become overloaded by the continuous stream of data pouring in from these sources. This session will aim to help librarians understand 1) what sorts of data their library already has (or easily could have) access to about how their users use their various web tools, 2) what that data can and cannot tell them, and 3) how to use the datasets they are collecting in a holistic manner to help them make design decisions. The presentation will feature examples from the presenters’ own experience of incorporating user data in decisions related to design the Bethel University Libraries’ web presence.
lack of fear, changing the mindset.
deep collaboration both within and cross-consortia
don’t rely on vendor solutions. changing mindset
development = oppty (versus development as “work”)
private higher education is PALNI
3d virtual picture of disastrous areas. unlock the digital information to be digitally accessible to all people who might be interested.
they opened the maps of Katmandu for the local community and they were coming up with the strategies to recover. democracy in action
i can’t stop thinking that the keynote speaker efforts are mere follow up of what Naomi Klein explains in her Shock Doctrine: http://www.naomiklein.org/shock-doctrine: a government country seeks reasons to destroy another country or area and then NGOs from the same country go to remedy the disasters
A question from a librarian from the U about the use of drones. My note: why did the SCSU library have to give up its drone?
Douglas County Library model. too resource intensive to continue
Marmot Library Network
ILS integrated library system – shared with other counties, same sever for the entire consortium. they have a programmer, viewfind, open source, discovery player, he customized viewfind community to viewfind plus. instead of using the ILS public access catalogue, they are using the Vufind interface
Caiifa Enki. public library – single access collection. they purchase ebooks from the publisher and they are using also the viewfind interface. but not integrated with the library catalogs. Kansas public library went from OverDrive to Viewfind. CA State library is funding for the time being this effort.
Harper Collins is too cumbersome and the reason to avoid working with them.
security issues. some of the material sent over ftp and immediately moved to sftp
decisions – use of internal resources only, if now – amazon
programmer used for the pilot. contracted programmers. lack of the ability to see the large picture. eventually hired a full time person, instead of outsourcing. RDA compliant MARC.
ONIX, spreadsheet MARC.
Decision about who to start with : public or academic.
attempt to keep pricing down –
own agreement with the customers, separate from the agreement with the Publisher
current development: web-based online reading, shared-consortial collections and SIP2 authentication
the Center for the Advanced Study of Technology Leadership in Education – CASTLE
If a school’s reputation and pride are built on decades or centuries of “this is how we’ve always done things here,” resistance from staff, parents, and alumni to significant changes may be fierce. In such institutions, heads of school may have to steer carefully between deeply ingrained habits and the need to modernize the information tools with which students and faculty work
Too often, when navigating faculty or parental resistance, school leaders and technology staff make reassurances that things will not have to change much in the classroom or that slow baby steps are OK. Unfortunately, this results in a different problem, which is that schools have now invested significant money, time, and energy into digital technologies but are using them sparingly and seeing little impact. In such schools, replicative uses of technology are quite common, but transformative uses that leverage the unique affordances of technology are quite rare.
many schools fail to proceed further because they don’t have a collective vision of what more transformative uses of technology might look like, nor do they have a shared understanding of and commitment to what it will take to get to such a place. As a result, faculty instruction and the learning experiences of students change little or not at all.
These schools have taken the time to involve all stakeholders—including students—in substantive conversations about what digital tools will allow them to do differently compared with previous analog practices. Their visions promote the potential of computing devices to facilitate all of those elements we now think of as essential 21st-century capacities: confidence, curiosity, enthusiasm, passion, critical thinking, problem-solving, and self-direction. Technology doesn’t simply support traditional teaching—it transforms it for deeper thinking and gives students more agency over their own learning.
Another prevalent issue preventing technology change in schools is fear—fear of change, of the unknown, of letting go of what we know best, of being learners again. But it’s also a fear of letting kids have wide access to the Internet with the possibility of cyberbullying, access to inappropriate material, and exposure to online predators or even excessive advertising. Fears, of course, need to be surfaced and addressed.
The fear drives some schools to ban cellphones, disallow students and faculty from using Facebook, and lock down Internet filters so tightly that useful websites are inaccessible. They prohibit the use of Twitter and YouTube, and they block blogs. Some educators see these types of responses as principled stands against the shortcomings and hassles of digital technologies. Others see them as rejections of the dehumanization of the education process by soulless machines. Often, however, it’s just schools clinging to the past and elevating what is comfortable or familiar over the potential of technology to help them better deliver on their school missions.
Heads of school don’t have to be skilled users themselves to be effective technology leaders, but they do have to exercise appropriate oversight and convey the message—repeatedly—that frequent, meaningful technology use in school is both important and expected. Nostalgia aside, there is no foreseeable future in which the primacy of printed text is not superseded by electronic text and multimedia. When nearly all information is digital or online, multi-modal and multimedia, accessed by mobile devices that fit in our pockets, the question should not be whether schools prepare students for a digital learning landscape, but rather how.
Many educators aren’t necessarily afraid of technology, but they are so accustomed to heavily teacher-directed classrooms that they are leery about giving up control—and can’t see the value in doing so.
Although most of us recognize that mobile computers connected to the Internet may be the most powerful learning devices yet invented—and that youth are learning in powerful ways at home with these technologies—allowing students to have greater autonomy and ownership of the learning process can still seem daunting and questionable.
The “beyond” is particularly important. When we give students some voice in and choice about what and how they learn, we honor basic human needs for autonomy, we enhance students’ interest and engagement, and we truly actualize our missions of preparing lifelong learners.
The goal of instructional transformation is to empower students, not to disempower teachers. While instructor unfamiliarity with digital technologies, inquiry- or problem-based teaching techniques, or deeper learning strategies may result in some initial discomfort, these challenges can be overcome with robust support.
A few workshops here and there rarely result in large-scale changes in implementation.
teacher-driven “unconferences” or “edcamps,” at which educators propose and facilitate discussion topics, can be powerful mechanisms for fostering professional dialogue and learning. Similarly, some schools offer voluntary “Tech Tuesdays” or “appy hours” to foster digital learning among interested faculty.
In addition to existing IT support, technology integration staff, or librarians/media specialists, some schools have student technology teams that are on call for assistance when needed.
A few middle schools and high schools go even further and assign teachers their own individual student technology mentors. These student-teacher pairings last all school year and comprise the first line of support for educators’ technology questions.
As teachers, heads of school, counselors, coaches, and librarians, we all now have the ability to participate in ongoing, virtual, global communities of practice.
Whether formal or informal, the focus of technology-related professional learning should be on student learning, not on the tools or devices. Independent school educators should always ask, “Technology for the purpose of what?” when considering the inclusion of digital technologies into learning activities. Technology never should be implemented just for technology’s sake.
Media technology—from mass media to social media and from video gaming to computer-mediated communication—plays an increasingly central role in people’s lives. Due to exponential increases in computing power, people now carry incredibly powerful computers—their smartphones—everywhere they go. This ever-greater access to media technology is generating an ever-greater conflict between media activities and the unmediated activities critical for psychological well-being—from our face-to-face conversations and family time to our down time and work lives. What are the costs and benefits of people’s modern media technology use for psychological well-being? Using a complementarity-interference (CI) framework, I review research to illuminate key psychological processes (i.e., mediators) and conditions (i.e., moderators) of the relationship between media technology and psychological well-being. Based on the existing evidence, I propose an initial theoretical CI model of the effects of media technology on psychological well-being. I use this CI model to outline important directions for future research, providing guidelines for an integrated, theoretically informed research on media technology.
Keywords: Media, Communication technology, Computer-mediated communication (CMC), Subjective well-being, Human-computer interaction (HCI)
Definition Media Technology
Media technology. In this chapter, we will explore psychological well-being in the context of modern media technology. In common parlance, we often think of the word ‘media’ as referring to mass media, such as news media (e.g., TV, radio), and more recently, to social media (e.g., Facebook, Twitter, Instagram). But media—the plural of medium—broadly refers to any technological tool that serves as a bridge or conduit to stimuli not otherwise available in the immediate physical environment. Thus, media technology refers to books and newspapers, radio and television, video and computer games—or to any device or method people use to transcend the constraints of their immediate physical environment: from yesterday’s dial-up telephone to the today’s smartphone, and from writing a hand-written letter to texting a friend (c.f., Okdie et al., 2014). Related terms also exist in the literature including information and communication technology, or ICT, as well as computer-mediated communication, or CMC. Most of the findings discussed here apply to—and in fact come from—the literature on ICT and CMC
While using the broad term, media technology, this chapter will focus primarily on the effects of media technology developed in the past century or so, including television, video games, and, most recently, mobile computers such as smartphones. In other words, we will be focusing on screen media technology. I will use the term mediated to refer to the stimuli afforded by the media technology, and the term unmediated to refer to behavior that does not involve the use of media (e.g., face-to-face interactions). Even though media technology itself is physical, I will use the term immediate physical environment to refer to the environment in which the media technology use occurs.