Over the past 10 years, new learning management systems (LMSs) have sprung on the scene to rival the Blackboards and Moodles of old. On the EdSurge Product Index alone, 56 products self-identify and fall into the LMS category. And with certain established companies like Pearson pulling out of the LMS ranks, where do you start?
As University of Central Florida’s Associate Vice President of Distributed Learning, Tom Cavanagh, wrote in an article for EDUCAUSE, “every institute has a unique set of instructional and infrastructure circumstances to consider when deciding on an LMS,” but at the same time, “all institutions face certain common requirements”—whether a small charter school, a private university or a large public school district.
The LMS Checklist
#1: Is the platform straightforward and user-friendly?
#2: Who do we want to have access to this platform, and can we adjust what they can see?
#3: Can the instructor and student(s) talk to and communicate with each other easily?
“Students and faculty live a significant portion of their daily lives online in social media spaces,” writes University of Central Florida’s Tom Cavanagh in his article on the LMS selection process. “Are your students and faculty interested in these sorts of interplatform connections?”
#5: Does this platform plug in with all of the other platforms we have?
“Given the pace of change and the plethora of options with educational technology, it’s very difficult for any LMS vendor to keep up with stand-alone tools that will always outperform built-in tools,” explains Michael Truong, executive director of innovative teaching and technology at Azusa Pacific University. According to Truong, “no LMS will be able to compete directly with tools like Piazza (discussion forum), Socrative (quizzing), EdPuzzle (video annotation), etc.”
As a result, Truong says, “The best way to ‘prepare’ for future technological changes is to go with an LMS that plays well with external tools.”
the Center for the Advanced Study of Technology Leadership in Education – CASTLE
Vision
If a school’s reputation and pride are built on decades or centuries of “this is how we’ve always done things here,” resistance from staff, parents, and alumni to significant changes may be fierce. In such institutions, heads of school may have to steer carefully between deeply ingrained habits and the need to modernize the information tools with which students and faculty work
Too often, when navigating faculty or parental resistance, school leaders and technology staff make reassurances that things will not have to change much in the classroom or that slow baby steps are OK. Unfortunately, this results in a different problem, which is that schools have now invested significant money, time, and energy into digital technologies but are using them sparingly and seeing little impact. In such schools, replicative uses of technology are quite common, but transformative uses that leverage the unique affordances of technology are quite rare.
many schools fail to proceed further because they don’t have a collective vision of what more transformative uses of technology might look like, nor do they have a shared understanding of and commitment to what it will take to get to such a place. As a result, faculty instruction and the learning experiences of students change little or not at all.
These schools have taken the time to involve all stakeholders—including students—in substantive conversations about what digital tools will allow them to do differently compared with previous analog practices. Their visions promote the potential of computing devices to facilitate all of those elements we now think of as essential 21st-century capacities: confidence, curiosity, enthusiasm, passion, critical thinking, problem-solving, and self-direction. Technology doesn’t simply support traditional teaching—it transforms it for deeper thinking and gives students more agency over their own learning.
Fear
Another prevalent issue preventing technology change in schools is fear—fear of change, of the unknown, of letting go of what we know best, of being learners again. But it’s also a fear of letting kids have wide access to the Internet with the possibility of cyberbullying, access to inappropriate material, and exposure to online predators or even excessive advertising. Fears, of course, need to be surfaced and addressed.
The fear drives some schools to ban cellphones, disallow students and faculty from using Facebook, and lock down Internet filters so tightly that useful websites are inaccessible. They prohibit the use of Twitter and YouTube, and they block blogs. Some educators see these types of responses as principled stands against the shortcomings and hassles of digital technologies. Others see them as rejections of the dehumanization of the education process by soulless machines. Often, however, it’s just schools clinging to the past and elevating what is comfortable or familiar over the potential of technology to help them better deliver on their school missions.
Heads of school don’t have to be skilled users themselves to be effective technology leaders, but they do have to exercise appropriate oversight and convey the message—repeatedly—that frequent, meaningful technology use in school is both important and expected. Nostalgia aside, there is no foreseeable future in which the primacy of printed text is not superseded by electronic text and multimedia. When nearly all information is digital or online, multi-modal and multimedia, accessed by mobile devices that fit in our pockets, the question should not be whether schools prepare students for a digital learning landscape, but rather how.
Control
Many educators aren’t necessarily afraid of technology, but they are so accustomed to heavily teacher-directed classrooms that they are leery about giving up control—and can’t see the value in doing so.
Although most of us recognize that mobile computers connected to the Internet may be the most powerful learning devices yet invented—and that youth are learning in powerful ways at home with these technologies—allowing students to have greater autonomy and ownership of the learning process can still seem daunting and questionable.
The “beyond” is particularly important. When we give students some voice in and choice about what and how they learn, we honor basic human needs for autonomy, we enhance students’ interest and engagement, and we truly actualize our missions of preparing lifelong learners.
The goal of instructional transformation is to empower students, not to disempower teachers. While instructor unfamiliarity with digital technologies, inquiry- or problem-based teaching techniques, or deeper learning strategies may result in some initial discomfort, these challenges can be overcome with robust support.
Support
A few workshops here and there rarely result in large-scale changes in implementation.
teacher-driven “unconferences” or “edcamps,” at which educators propose and facilitate discussion topics, can be powerful mechanisms for fostering professional dialogue and learning. Similarly, some schools offer voluntary “Tech Tuesdays” or “appy hours” to foster digital learning among interested faculty.
In addition to existing IT support, technology integration staff, or librarians/media specialists, some schools have student technology teams that are on call for assistance when needed.
A few middle schools and high schools go even further and assign teachers their own individual student technology mentors. These student-teacher pairings last all school year and comprise the first line of support for educators’ technology questions.
As teachers, heads of school, counselors, coaches, and librarians, we all now have the ability to participate in ongoing, virtual, global communities of practice.
Whether formal or informal, the focus of technology-related professional learning should be on student learning, not on the tools or devices. Independent school educators should always ask, “Technology for the purpose of what?” when considering the inclusion of digital technologies into learning activities. Technology never should be implemented just for technology’s sake.
$129. Select CoSN Member or Non-member, change the “0” next to the “Symposium on Educating for Digital Citizenship ONLY” to a “1”. Click “next” and complete your registration.
CoSN and UNESCO, in partnership with the Global Education Conference, HP, ClassLink, Participate, Qatar Foundation International, Partnership for 21st Century Learning, ISTE, iEARN-USA, The Stevens Initiative at the Aspen Institute, World Savvy, Wikimedia, TakingITGlobal, Smithsonian Institute, and Project Tomorrow, are hosting this event to bring together thought leaders from across the world to explore the role of education in ensuring students are responsible digital citizens.
Internet safety has been a concern for policymakers and educators since the moment technology, particularly the Internet, was introduced to classrooms. Increasingly many school systems are evolving that focus from simply minimizing risk and blocking access, to more responsible use policies and strategies that empower the student as a digital citizen. Digital citizenship initiatives also seek to prepare students to live in a world where online hate and radicalization are all too common.
Join us for a lively and engaging exploration of what are the essential digital citizenship skills that students need, including policies and practices in response to the following questions:
How can technology be used to improve digital citizenship and to what extent is technology providing new challenges to digital citizenship?
How should we access information effectively and form good evaluate its accuracy?
How should we develop the skills to engage with others respectfully and in a sensitive and ethical manner?
How should we develop an appropriate balance between instruction and nurturing student behaviors that ensure ICT (Information and communications technology) is used safely and responsibly?
Online Course | Designing a Collaborative Instructional Technology Support Model
Part 1: March 7, 2018 | 1:00–2:30 p.m. ET
Part 2: March 14, 2018 | 1:00–2:30 p.m. ET
Part 3: March 21, 2018 | 1:00–2:30 p.m. ET
Faculty need a variety of instructional technology support—instructional design, content development, technology, training, and assessment—to name a few. They don’t want to go to one place for help, find out they’re in the wrong place, and be sent somewhere else—digitally or physically. Staff don’t want to provide help in silos or duplicate what other units are doing.
So, how can academic service providers collaborate to offer the right instructional technology support services, in the right place, at the right time, in the right way? In this course, instructional technologists, instructional designers, librarians, and instructional technology staff will learn to use a tool called the Service Center Canvas that does just that.
Learning Objectives:
During this course, participants will:
Explore the factors that influence how instructional technology support services are offered in higher education
Answer critical questions about how your instructional technology support services should be delivered relative to broader trends and institutional goals
Experiment with ways to prototype new services and/or new ways of delivering them
Identify potential implementation obstacles and ways to address them
NOTE: Participants will be asked to complete assignments in between the course segments that support the learning objectives stated below and will receive feedback and constructive critique from course facilitators on how to improve and shape their work.
Course Facilitators
Elliot Felix, Founder and CEO, brightspot strategy
Felix founded and leads brightspot, a strategy consultancy that reimagines places, rethinks services, and redesigns organizations on university campuses so that people are better connected to a purpose, information, and each other. Felix is accomplished strategist, facilitator, and sense-maker who has helped transform over 70 colleges and universities.
Adam Griff is a director at brightspot. He helps universities rethink their space, reinvent their service offerings, and redesign their organization to improve the experiences of their faculty, students, and staff, connecting people and processes to create simple and intuitive answers to complex questions. He has led projects with a wide range of higher education institutions including University of Wisconsin–Madison, University of North Carolina at Chapel Hill, and University of California, Berkeley.
Guardtime – This company is creating “keyless” signature systems using blockchain which is currently used to secure the health records of one million Estonian citizens.
REMME is a decentralized authentication system which aims to replace logins and passwords with SSL certificates stored on a blockchain.
Healthcare
Gem – This startup is working with the Centre for Disease Control to put disease outbreak data onto a blockchain which it says will increase the effectiveness of disaster relief and response.
SimplyVital Health – Has two health-related blockchain products in development, ConnectingCare which tracks the progress of patients after they leave the hospital, and Health Nexus, which aims to provide decentralized blockchain patient records.
MedRec – An MIT project involving blockchain electronic medical records designed to manage authentication, confidentiality and data sharing.
Financial services
ABRA – A cryptocurrency wallet which uses the Bitcoin blockchain to hold and track balances stored in different currencies.
Bank Hapoalim – A collaboration between the Israeli bank and Microsoft to create a blockchain system for managing bank guarantees.
Barclays – Barclays has launched a number of blockchain initiatives involving tracking financial transactions, compliance and combating fraud. It states that “Our belief …is that blockchain is a fundamental part of the new operating system for the planet.”
Maersk – The shipping and transport consortium has unveiled plans for a blockchain solution for streamlining marine insurance.
Aeternity – Allows the creation of smart contracts which become active when network consensus agrees that conditions have been met – allowing for automated payments to be made when parties agree that conditions have been met, for example.
Augur – Allows the creation of blockchain-based predictions markets for the trading of derivatives and other financial instruments in a decentralized ecosystem.
Manufacturing and industrial
Provenance – This project aims to provide a blockchain-based provenance record of transparency within supply chains.
Jiocoin – India’s biggest conglomerate, Reliance Industries, has said that it is developing a blockchain-based supply chain logistics platform along with its own cryptocurrency, Jiocoin.
Hijro – Previously known as Fluent, aims to create a blockchain framework for collaborating on prototyping and proof-of-concept.
SKUChain – Another blockchain system for allowing tracking and tracing of goods as they pass through a supply chain.
Blockverify – A blockchain platform which focuses on anti-counterfeit measures, with initial use cases in the diamond, pharmaceuticals and luxury goods markets.
Transactivgrid – A business-led community project based in Brooklyn allowing members to locally produce and cell energy, with the goal of reducing costs involved in energy distribution.
STORJ.io – Distributed and encrypted cloud storage, which allows users to share unused hard drive space.
Government
Dubai – Dubai has set sights on becoming the world’s first blockchain-powered state. In 2016 representatives of 30 government departments formed a committee dedicated to investigating opportunities across health records, shipping, business registration and preventing the spread of conflict diamonds.
Estonia – The Estonian government has partnered with Ericsson on an initiative involving creating a new data center to move public records onto the blockchain. 20
South Korea – Samsung is creating blockchain solutions for the South Korean government which will be put to use in public safety and transport applications.
Govcoin – The UK Department of Work and Pensions is investigating using blockchain technology to record and administer benefit payments.
Democracy.earth – This is an open-source project aiming to enable the creation of democratically structured organizations, and potentially even states or nations, using blockchain tools.
Followmyvote.com – Allows the creation of secure, transparent voting systems, reducing opportunities for voter fraud and increasing turnout through improved accessibility to democracy.
Charity
Bitgive – This service aims to provide greater transparency to charity donations and clearer links between giving and project outcomes. It is working with established charities including Save The Children, The Water Project and Medic Mobile.
Retail
OpenBazaar – OpenBazaar is an attempt to build a decentralized market where goods and services can be traded with no middle-man.
Loyyal – This is a blockchain-based universal loyalty framework, which aims to allow consumers to combine and trade loyalty rewards in new ways, and retailers to offer more sophisticated loyalty packages.
Blockpoint.io – Allows retailers to build payment systems around blockchain currencies such as Bitcoin, as well as blockchain derived gift cards and loyalty schemes.
Real Estate
Ubiquity – This startup is creating a blockchain-driven system for tracking the complicated legal process which creates friction and expense in real estate transfer.
Transport and Tourism
IBM Blockchain Solutions – IBM has said it will go public with a number of non-finance related blockchain initiatives with global partners in 2018. This video envisages how efficiencies could be driven in the vehicle leasing industry.
Arcade City – An application which aims to beat Uber at their own game by moving ride sharing and car hiring onto the blockchain.
La’Zooz – A community-owned platform for synchronizing empty seats with passengers in need of a lift in real-time.
Webjet – The online travel portal is developing a blockchain solution to allow stock of empty hotel rooms to be efficiently tracked and traded, with payment fairly routed to the network of middle-men sites involved in filling last-minute vacancies.
Media
Kodak – Kodak recently sent its stock soaring after announcing that it is developing a blockchain system for tracking intellectual property rights and payments to photographers.
Ujomusic – Founded by singer-songwriter Imogen Heap to record and track royalties for musicians, as well as allowing them to create a record of ownership of their work.
It is exciting to see all these developments. I am sure not all of these will make it into successful long-term ventures but if they indicate one thing, then it is the vast potential the blockchain technology is offering.
Blockchain technology has the potential to enhance the role played by libraries within their communities, however, there are many questions yet to be answered about how specifically blockchain technology might be used and how much value it would add to library services and the communities they serve. Ideas from within the information profession are needed as we formulate recommendations for the profession.
The San José State University School of Information (iSchool) received an IMLS grant to investigate ways that blockchain technology can be used by libraries as a community anchor to partner with other organizations and to support city/community goals. Some suggestions for blockchain applications in libraries include building an enhanced metadata center, protecting Digital First Sale rights, supporting community-based collections, facilitating partnerships across organizations, and more.
The year-long project will provide three opportunities for a national dialog among technical experts in libraries, blockchain technology, and urban planning and members of the information professions to discuss ways that blockchain technology can advance library services to support city/community goals.
The project website and blog includes information and resources about blockchain technology, potential uses of blockchain technology by libraries, and project updates along with a blog to foster open dialog. Seehttps://ischoolblogs.sjsu.edu/blockchains/
The National Forumscheduled for August 6, 2018 in San Jose, CA will be comprised of 20-30 technical experts in libraries, blockchain technology, and urban planning to identify and discuss key opportunities for libraries to serve as community anchors using blockchain technology.
The Library 2.018 conference, Blockchain Applied: Impact on the Information Profession, is designed for presentations and discussion on the uses of blockchain technology in libraries. Registration in this open online conference is free to the profession and public. Scheduled on June 7, 2018 from 12:00 – 3:00 pm PDT. The call for proposals is located on the conference website.
We are seeking nominations of individuals to represent the professional associations (e.g. LITA, PLA, ULC, CLIR, ARL) and information organizations by participating in the National Forum in San Jose, CA (August 6, 2018). Funding provided by IMLS is available to support most of the expenses (travel, lodging, meals) for the National Forum for invited participants.
Nominations (including self-nominations) are due by February 15, 2018. Nominees should be knowledgeable about blockchain technology and libraries in order to have an impact on the recommendations that will be made and discussed during the Library 2.018 conference and National Forum.
Nominations to participate in the Blockchain National Forum should be submitted by February 15 using this Google Form.
Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.
Learning Outcomes:
at the end of the session, participants will have an idea about gaming and gamification in education and will be able to discriminate between those two powerful concepts in education
at the end of this session, participants will be able search and select VIdeo 360 movies for their class lessons
at the end of the session, participants will be able to understand the difference between VR, AR and MR.
if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.
How would you define gamification of the educational process?
Gaming and Gamification in academic and library settings (paper) Short URL: http://scsu.mn/1F008Re
Gamification takes game elements (such as points, badges, leaderboards, competition, achievements) and applies them to a non-game setting. It has the potential to turn routine, mundane tasks into refreshing, motivating experiences (What is GBL (Game-Based Learning)?, n.d.).
Gamification is defined as the process of applying game mechanics and game thinking to the real world to solve problems and engage users (Phetteplace & Felker, 2014, p. 19; Becker, 2013, p. 199; Kapp, 2012). Gamification requires three sets of principles: 1. Empowered Learners, 2. Problem Solving, 3. Understanding (Gee, 2005).
Apply gamification tactics to existing learning task
split in groups and develop a plan to gamify existing learning task
from the web page above, choose a movie or click on this link: https://youtu.be/nOHM8gnin8Y (to watch a black hole in video 360) Open the link on your phone and insert the phone in Google Cardboard. Watch the video using Google Cardboard.
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.
I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets
The dating app knows me better than I do, but these reams of intimate information are just the tip of the iceberg. What if my data is hacked – or sold?
Every European citizen is allowed to do so under EU data protection law, yet very few actually do, according to Tinder.
With the help of privacy activist Paul-Olivier Dehaye from personaldata.io and human rights lawyer Ravi Naik, I emailed Tinder requesting my personal data and got back way more than I bargained for.
Some 800 pages came back containing information such as my Facebook “likes”, links to where my Instagram photos would have been had I not previously deleted the associated account, my education, the age-rank of men I was interested in, how many Facebook friends I had, when and where every online conversation with every single one of my matches happened … the list goes on.
Reading through the 1,700 Tinder messages I’ve sent since 2013, I took a trip into my hopes, fears, sexual preferences and deepest secrets. Tinder knows me so well. It knows the real, inglorious version of me who copy-pasted the same joke to match 567, 568, and 569; who exchanged compulsively with 16 different people simultaneously one New Year’s Day, and then ghosted 16 of them.
“What you are describing is called secondary implicit disclosed information,” explains Alessandro Acquisti, professor of information technology at Carnegie Mellon University. “Tinder knows much more about you when studying your behaviour on the app. It knows how often you connect and at which times; the percentage of white men, black men, Asian men you have matched; which kinds of people are interested in you; which words you use the most; how much time people spend on your picture before swiping you, and so on. Personal data is the fuel of the economy. Consumers’ data is being traded and transacted for the purpose of advertising.”.
In May, an algorithm was used to scrape 40,000 profile images from the platform in order to build an AI to “genderise” faces. A few months earlier, 70,000 profiles from OkCupid (owned by Tinder’s parent company Match Group) were made public by a Danish researcher some commentators have labelled a “white supremacist”, who used the data to try to establish a link between intelligence and religious beliefs. The data is still out there.
The Next 10 Years: Helping STEM Students Thrive series, on January 10th, from 12-1:30 PM ET. The topic will be learning spaces with the following guest speakers:
Jeanne L. Narum, Principal, Learning Spaces Collaboratory
Jeanne will discuss what she has learned about what works, why and how it works in achieving sustainable institutional transformation in the world of planning spaces for learning in the undergraduate setting.
Lisa Stephens, Sr. Strategist- SUNY Academic Innovation – University at Buffalo
Rebecca Rotundo, Instructional Technology Specialist, University at Buffalo
Lisa and Rebecca will share their experience in FLEXspace (Flexible Learning Environments eXchange) an open education repository project which has expanded to over 2,600+ users from 1,200+ educational institutions across 42 countries.
Xin Li, Associate University Librarian, Cornell
Xin will share information about the Library’s initiative to install a Portal on the Cornell campus in Sept. 2018, with the goal to engage faculty, students, and the community in live conversations with Portal users in different countries, cultures, or life circumstances, such as what others do for STEM education.
This collaboration between Cornell University and the University at Buffalo featuring the perspectives of national thought leaders and institutional representatives about expanding the participation of women in undergraduate STEM education at different scales.
This interactive, online series features a different topic per month. Each session kicks off with an introduction by our distinguished thought leaders followed by institutional representatives from Cornell University and the University at Buffalo who will share insights from their campuses. Participants may join the conversation, ask questions, share experiences, build networks and learn more about:
· Innovations that can expand female or underrepresented minority student participation and success in STEM undergraduate education.
· Effective evidence-based STEM teaching practices commonly adopted at research universities.
· Unique institutional and cultural challenges to achieving STEM diversity.