Patches is a free online tool for creating virtual reality scenes. Patches offers animated characters, animals, buildings, and common objects that you can place inside a virtual reality scene. Just drag and drop objects and animations
At University of Wisconsin – Superior – we have stopped offering proctoring for students. Faculty, however, have come up with a way for online testing. They ask student to use Kaltura tto record their face and part of the test and then post the video in the dropbox.
U.S. Education Secretary spared no words in her critique of education reform efforts during the Bush and Obama administrations. “I don’t think there is much we can hold onto, from a federal level, that we can say was a real success,”
This is not the first time DeVos has praised personalized learning. The education secretary visited Thomas Russell Middle School in Milpitas, Calif
Her vision of personalized learning has plenty of detractors. Educators and administrators have already begun to voice their reservations about personalized learning in schools. At a gathering of educators in Oakland last October speakers decried what they described as the privatization of public education through the introduction of technology initiatives such as personalized learning. More recently, former AltSchool educator Paul Emerich wrote a blog post titled, “Why I Left Silicon Valley, EdTech, and ‘Personalized’ Learning,” where he offered critiques of the personalized learning movement in his school. The post touched on concerns about his workload and interactions with students.
Parents are raising pressure too. In at least two states, their concerns over screen-time and digital content used in online educational platform has forced districts to suspend the implementation of technology-enabled personalized learning programs such as Summit Learning.
De Vos pointed to previous federal-led education funding programs as a “carrot” that made little or no impact. Her critique is not unfounded: A report published last year by the Education Department’s research division found that the $7 billion School Improvement Grants program made “no significant impacts” on test scores, high school graduation rates or college enrollment.
Common Core is currently adopted in 36 states, according to EdWeek’s Common Core Tracker, last updated September 2017.
++++++++++++++++
DeVos: ‘Common Core Is Dead’; A Large Online Charter School Is Shut Down
One of the largest online charter schools in the country closed this week amid a financial and legal dispute with the state of Ohio.
Education Secretary Betsy DeVos in a keynote address this week to the American Enterprise Institute.
She also cited a survey by the American Federation of Teachers that 60 percent of its teachers reported having moderate to no influence over the content and skills taught in their own classrooms. That same survey also noted that 86 percent of teachers said they do not feel respected by DeVos.
until recently, broadcasting and publishing were difficult and expensive affairs, their infrastructures riddled with bottlenecks and concentrated in a few hands.
When protests broke out in Ferguson, Missouri, in August 2014, a single livestreamer named Mustafa Hussein reportedly garnered an audience comparable in size to CNN’s for a short while. If a Bosnian Croat war criminal drinks poison in a courtroom, all of Twitter knows about it in minutes.
In today’s networked environment, when anyone can broadcast live or post their thoughts to a social network, it would seem that censorship ought to be impossible. This should be the golden age of free speech.
And sure, it is a golden age of free speech—if you can believe your lying eyes. Is that footage you’re watching real? Was it really filmed where and when it says it was? Is it being shared by alt-right trolls or a swarm of Russian bots? My note: see the ability to create fake audio and video footage: https://blog.stcloudstate.edu/ims/2017/07/15/fake-news-and-video/
HERE’S HOW THIS golden age of speech actually works: In the 21st century, the capacity to spread ideas and reach an audience is no longer limited by access to expensive, centralized broadcasting infrastructure. It’s limited instead by one’s ability to garner and distribute attention. And right now, the flow of the world’s attention is structured, to a vast and overwhelming degree, by just a few digital platforms: Facebook, Google (which owns YouTube), and, to a lesser extent, Twitter.
at their core, their business is mundane: They’re ad brokers
They use massive surveillance of our behavior, online and off, to generate increasingly accurate, automated predictions of what advertisements we are most susceptible to and what content will keep us clicking, tapping, and scrolling down a bottomless feed.
in reality, posts are targeted and delivered privately, screen by screen by screen. Today’s phantom public sphere has been fragmented and submerged into billions of individual capillaries. Yes, mass discourse has become far easier for everyone to participate in—but it has simultaneously become a set of private conversations happening behind your back. Behind everyone’s backs.
It’s important to realize that, in using these dark posts, the Trump campaign wasn’t deviantly weaponizing an innocent tool. It was simply using Facebook exactly as it was designed to be used. The campaign did it cheaply, with Facebook staffers assisting right there in the office, as the tech company does for most large advertisers and political campaigns.
Overstream is a free online editor for creating and synchronizing subtitles to any online video (YouTube, Google Video, MySpace Video, Veoh, Blip.tv, Archive.org and Vimeo.com), store subtitles on the Overstream server, and send the link to the subtitled video to other users, friends or colleagues.
Overstream supports all languages, however, in order to work, the language must be installed on the viewer’s computer.
Both javascript and cookies need to be enabled in your browser in order for this website to work as intended. Also, the Overstream Editor and Player require Flash Player version 8 or above to be installed.
Blockchain technology has the potential to enhance the role played by libraries within their communities, however, there are many questions yet to be answered about how specifically blockchain technology might be used and how much value it would add to library services and the communities they serve. Ideas from within the information profession are needed as we formulate recommendations for the profession.
The San José State University School of Information (iSchool) received an IMLS grant to investigate ways that blockchain technology can be used by libraries as a community anchor to partner with other organizations and to support city/community goals. Some suggestions for blockchain applications in libraries include building an enhanced metadata center, protecting Digital First Sale rights, supporting community-based collections, facilitating partnerships across organizations, and more.
The year-long project will provide three opportunities for a national dialog among technical experts in libraries, blockchain technology, and urban planning and members of the information professions to discuss ways that blockchain technology can advance library services to support city/community goals.
The project website and blog includes information and resources about blockchain technology, potential uses of blockchain technology by libraries, and project updates along with a blog to foster open dialog. Seehttps://ischoolblogs.sjsu.edu/blockchains/
The National Forumscheduled for August 6, 2018 in San Jose, CA will be comprised of 20-30 technical experts in libraries, blockchain technology, and urban planning to identify and discuss key opportunities for libraries to serve as community anchors using blockchain technology.
The Library 2.018 conference, Blockchain Applied: Impact on the Information Profession, is designed for presentations and discussion on the uses of blockchain technology in libraries. Registration in this open online conference is free to the profession and public. Scheduled on June 7, 2018 from 12:00 – 3:00 pm PDT. The call for proposals is located on the conference website.
We are seeking nominations of individuals to represent the professional associations (e.g. LITA, PLA, ULC, CLIR, ARL) and information organizations by participating in the National Forum in San Jose, CA (August 6, 2018). Funding provided by IMLS is available to support most of the expenses (travel, lodging, meals) for the National Forum for invited participants.
Nominations (including self-nominations) are due by February 15, 2018. Nominees should be knowledgeable about blockchain technology and libraries in order to have an impact on the recommendations that will be made and discussed during the Library 2.018 conference and National Forum.
Nominations to participate in the Blockchain National Forum should be submitted by February 15 using this Google Form.
Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.
Learning Outcomes:
at the end of the session, participants will have an idea about gaming and gamification in education and will be able to discriminate between those two powerful concepts in education
at the end of this session, participants will be able search and select VIdeo 360 movies for their class lessons
at the end of the session, participants will be able to understand the difference between VR, AR and MR.
if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.
How would you define gamification of the educational process?
Gaming and Gamification in academic and library settings (paper) Short URL: http://scsu.mn/1F008Re
Gamification takes game elements (such as points, badges, leaderboards, competition, achievements) and applies them to a non-game setting. It has the potential to turn routine, mundane tasks into refreshing, motivating experiences (What is GBL (Game-Based Learning)?, n.d.).
Gamification is defined as the process of applying game mechanics and game thinking to the real world to solve problems and engage users (Phetteplace & Felker, 2014, p. 19; Becker, 2013, p. 199; Kapp, 2012). Gamification requires three sets of principles: 1. Empowered Learners, 2. Problem Solving, 3. Understanding (Gee, 2005).
Apply gamification tactics to existing learning task
split in groups and develop a plan to gamify existing learning task
from the web page above, choose a movie or click on this link: https://youtu.be/nOHM8gnin8Y (to watch a black hole in video 360) Open the link on your phone and insert the phone in Google Cardboard. Watch the video using Google Cardboard.
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.