Author Archive

Android app on Daydream

How To Get Any Android App Running On A Daydream Standalone VR Headset

IAN HAMILTON • MAY 10TH, 2018

https://uploadvr.com/android-daydream-app-standalone-how-to/ 

One of the most intriguing hidden features of the first Daydream standalone headset — the Lenovo Mirage Solo — is its ability to play normal Android apps in a flat 2D window.

+++++++++++
more on Daydream in this IMS blog
https://blog.stcloudstate.edu/ims?s=daydream

virtual reality book tours

Virtual Reality Book Tours

SEPTEMBER 6, 2018

https://www.freetech4teachers.com/2018/09/virtual-reality-book-tours.html

Google’s VR Tour Creator

Vocaroo provides an easy way to record and download spoken audio.

This video provides an overview of the basic steps needed to make a VR tour. To add audio to the tour, follow the steps outlined in this video. And watch this video to learn how to layer-in pictures

VR Book Tour With Patches. is a free online tool for creating virtual reality scenes.

music and the brain

What’s Going On Inside the Brain When We Play Music?

Published on 

Humans love music, especially when there’s repetition that catches the attention.

“Playing music is the brain’s equivalent of a full body workout,” says educator Anita Collins in a TED-Ed video on how playing music benefits the brain. Playing music requires the visual, auditory, and motor cortices all at once

 

++++++++++++++
more on the brain in this IMS blog
https://blog.stcloudstate.edu/ims?s=brain

China and Microsoft Bing

China Restores Public Access To Microsoft’s Bing Search Engine

January 24, 20195:31 AM ET  

Microsoft President and Chief Legal Counsel Brad Smith explained that it’s not the first time the search engine has been blocked. “It happens periodically,” he said in an interview with Fox Business News from Davos, Switzerland, on Thursday.

“You know, we operate in China pursuant to some global principles that’s called the Global Network Initiative in terms of how we manage censorship demands and the like,” he said.

Although Bing enjoyed only about 2 percent of China’s search engine market, its banishment was significant in a country known for controlling electronic access to information. With Bing blocked, China’s citizens had even fewer options for finding information on the Internet.

 

college finances for waste

Students, employees scour college finances for waste, proof of unfair pay

As public confidence declines, university budgets and investments face growing scrutiny

https://hechingerreport.org/increasingly-skeptical-students-employees-want-colleges-to-show-them-the-money/ 
But seldom has this level of attention from students and employees been so focused on the finances of their own campuses. It coincides with what polls disclose is falling public confidence in higher education. And given the results, it seems likely to create more, not less, mistrust.
Higher education has become a popular public target. Fifty-eight percent of people polled by the think tank New Americasaid colleges and universities put their own interests ahead of those of students. About the same proportion in a Public Agenda survey said colleges care mostly about the bottom line, and 44 percent said they’re wasteful and inefficient. And a Gallup poll found that more than half of Americans have only some, or very little, confidence in higher education.
We want to see greater transparency in how they spend our money. And it is our money, most of it,” since such a large percentage of the budget comes from tuition

Protect Student Data

Six Ways to Protect Student Data and Prevent Cyberattacks

By Ricky Doyle     Dec 10, 2018

https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks

School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.

the most common cybersecurity threats, and how can school staff avoid them?

Eavesdropping / Man-in-the-Middle (MiTM) Attacks

What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.

How to avoid them: Always use a school-verified SIM carddongle or VPN(virtual private network) to access the internet in public places.

Social Engineering Attacks

According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:

1. Phishing emails

2. Baiting attacks

3. Quid pro quo requests

4. Pretexting attacks

5. Contact with a ‘compromised’ website

School Safety and Student Wellbeing

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 12, 2019
Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)

Introduction
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.

 

Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens.  School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.

 

Target Audience
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators.  This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators.  Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety

Recommended topics include, but are not limited to, the following:

Section I – Digital Leadership

  • Technology as a Climate and Cultural Transformation Tool
    • School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
  • Ensuring Equity within a “One to One” Technology Framework
    • Infrastructure within Communities
    • Accessible WiFi for Low SES Students
    • Developing Culturally Responsive Pedagogy
  • Professional Development for School Leaders

Section II – Well Being

  • Social Media and School Safety: Inputs and Outputs
    • Tip lines: Crime, Bullying, Threats
    • Communication and Transparency
    • Platform for Social Justice
  • Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
    • Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
  • Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
  • Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.

Section III- Infrastructure Safety

  • Campus/Facility Safety and Security
    • Rural Schools vs. Urban Schools
    • Digital A/V Systems
    • Background Check – Visitor Registration (i.e. Raptor)
  • Network Security Systems and Protocols
    • User Filtering and Monitoring
    • Firewalls
  • Policy
    • Appropriate use policies
    • Digital Citizenship
    • Web development policy
    • Privacy
    • Intellectual Property & Copyright

Section IV – Academic Success

  • Professional Development for Classroom Teachers
    • Pedagogical Integration of Technology
    • Instructional Coaching for Student Engagement
    • Increase Rigor with Technology
    • Competence in the Blended/Hybrid/Flipped Classroom
  • Technology to enhance learning for all
    • Assistive Technology
    • Accessibility issues
    • Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
  • Personal Learning Design
    • Differentiation for Student Efficacy
    • Strategies for Increasing Depth of Knowledge
    • Design Qualities for Enhanced Engagement

Submission Procedure
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager. USE THE FOLLOWING LINK TO SUBMIT YOUR PROPOSAL.  https://www.igi-global.com/publish/call-for-papers/call-details/3709

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.

Important Dates
February 12, 2019: Proposal Submission Deadline
March 12, 2019: Notification of Acceptance
June 12, 2019: Full Chapter Submission
August 10, 2019: Review Results Returned
August 10, 2019: Final Acceptance Notification
September 7, 2019: Final Chapter Submission

Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas
steph@uca.edu or 501-450-5430

Engagement in Online Schools

Does Presence Equal Progress? Tracking Engagement in Online Schools

By Steven Guttentag     Sep 25, 2016

https://www.edsurge.com/news/2016-09-25-does-presence-equal-progress-tracking-engagement-in-online-schools

Embracing online school requires a new mindset, as well as new criteria for measuring academic success—measures that take into account the nature of teaching and learning online, the types of students online schools serve, and the unique ways in which those students learn.

Teachers interact with students during synchronous learning sessions, and they connect one-on-one through calls, online chats, texts, and interactive whiteboard sessions.

Accountability measures must adapt to and reflect a self-paced, competency-based learning environment. A traditional one-size-fits-all rubric does not translate cleanly with respect to online schools.

++++++++++++
more on online engagement in this IMS blog
https://blog.stcloudstate.edu/ims?s=online+engagement

ethics and exact sciences

University Data Science Programs Turn to Ethics and the Humanities

By Sydney Johnson     Jan 11, 2019

https://www.edsurge.com/news/2019-01-11-university-data-science-programs-turn-to-ethics-and-the-humanities

“Formulating a product, you better know about ethics and understand legal frameworks.”

These days a growing number of people are concerned with bringing more talk of ethics into technology. One question is whether that will bring change to data-science curricula.

Following major data breaches and privacy scandals at tech companies like Facebook, universities including Stanford, the University of Texas and Harvard have all added ethics courses into computer science degree programs to address tech’s “ethical dark side,” the New York Times has reported.

As more college and universities consider incorporating humanities courses into technical degree programs, some are asking what kind of ethics should be taught.

 

++++++++++++++
more on ethics in this IMS blog
https://blog.stcloudstate.edu/ims?s=ethics

educators and innovation

What Educators Really Think About Innovation (Infographic)

January 8, 2019

https://www.edweek.org/ew/articles/2019/01/09/what-educators-really-think-about-innovation-infographic.html

In October 2018, the Education Week Research Center conducted a nationally representative online survey of nearly 500 K-12 teachers, principals, and district leaders to learn more about their views on innovation—a common buzzword that was defined in the survey as “the introduction and/or creation of new ideas or methods.”

educators and innovation

1 189 190 191 192 193 491