Author Archive

writing first draft

http://becomeawritertoday.com/writing-the-first-draft/

  • I go to a quiet room, office, library or coffee shop.
  • Depending on where I am, I brew/order a cup of coffee.
  • I disconnect my computer from the internet.
  • I put my phone in airplane mode.
  • I open up Scrivener.
  • I arrange the outline for the chapter in question.
  • I set a timer for 30 minutes.
  • I write, keep my fingers moving and avoid stopping to edit myself (this is harder than it sounds).
  • When the buzzer sounds, I stand up and take a two-minute break.
  • After this break, I review my outline and notes.

+++++++++++++++++++++

25 Things About Writing

by Justin McLachlan  http://www.justinmclachlan.com/1670/25-things-writing/

also in: http://pin.it/HwXSc4n

  • Real writing is actually a lot of rewriting.
  • Your friends won’t be as impressed the second time around. Don’t let it stop you.
  • Grammar, punctuation, spelling — it’s okay if all these things come last.
  • First drafts universally suck.
  • Avoid the advice of those who tell you otherwise of #5.
  • Trying to edit while writing is like trying to chop down a tree while you’re climbing it
  • Writing can be lonely. Very, very lonely.
  • Inspiration will never strike when you need it to. Just write. Do the work.
  • Complex construction doesn’t equal complex though. Simplify.
  • Deadlines. Goals. Set them, and stick to them.

++++++++++++++++++++
more on proofreading in this IMS blog
https://blog.stcloudstate.edu/ims?s=proofreading
more proofreading techniques for the EDAD doctoral cohort on Pinterest
https://www.pinterest.com/aidedza/doctoral-cohort/

immersive reality education conference

Immerse Yourself in Learning

Realities360. The Enhanced Realities Conference

Augmented Reality

Augmented reality adds computer-generated content as a contextual overlay to the real world. This technology, often powered by devices we already carry, has enormous applications for training and development.

Virtual Reality

Virtual reality has existed for decades, but technology has finally emerged that makes it truly accessible. VR allows us to put learners in a truly immersive environment, creating entirely new opportunities for training and learning.

Expanded Realities

AR and VR are just the start of the alternate-reality conversation. There are additional technologies that we can use on their own or as part of a blend with AR and VR to increase the level of immersion in the experiences we create.

Sessions list: https://www.elearningguild.com/realities360/content/4900/2017-realities360-conference–home/?utm_campaign=r17early&utm_medium=social&utm_source=linkedin-el2#sessions-link

++++++++++++++++++++++++
more on VR, AR in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

mindfulness librarians

Free Webinar: Mindfulness for Librarians

Friday, June 16, 2017  12 p.m. Central

Do you ever find yourself feeling overwhelmed at work? Increasingly, professionals are turning to the practice of mindfulness as a tool to help staff members and themselves manage stress. In our next episode of American Libraries Live, we’ll discuss how to use mindfulness to better handle stress and become more mindful in the workplace. We will also discuss burnout theory and the overall impact it has on you, your library users, and your organization as a whole. You’ll be introduced to mindfulness as we discuss its significance and how it relates to the library profession.
Please join us for this free hour-long webcast on Friday, June 16 at 1:00 p.m. Eastern.

Don’t miss out! Register today.

++++++++++++++++++++
more about mindfulness in this IMS blog
https://blog.stcloudstate.edu/ims?s=mindfulnessmindfu

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

responsible analytics

Call for Chapters: Responsible Analytics and Data Mining in Education

https://www.linkedin.com/groups/934617/934617-6276907956181233664

• Who collects and controls the data?
• Is it accessible to all stakeholders?
• How are the data being used, and is there a possibility for abuse?
• How do we assess data quality?
• Who determines which data to trust and use?
• What happens when the data analysis yields flawed results?
• How do we ensure due process when data-driven errors are uncovered?
• What policies are in place to address errors?
• Is there a plan for handling data breaches?

Call for Chapter Proposals page (https://big-data-in-education.blogspot.com)

++++++++++++++++++
more on data mining in this IMS blog
https://blog.stcloudstate.edu/ims?s=data+mining
more on analytics in this IMS blog
https://blog.stcloudstate.edu/ims?s=analytics

tutorials on MediaSpace

https://nhcc.ims.mnscu.edu/shared/StudentTraining/MediaSpace%20Instructions-Students.pdf
https://blog.stcloudstate.edu/ims/files/2013/10/Getting-Started-with-MediaSpace-v5-14ziaj5.pdf

https://learn.winona.edu/MediaSpace

https://knowledge.kaltura.com/kaltura-capturespace-lite-getting-started

https://knowledge.kaltura.com/kaltura-capturespace-lite-user-guide

++++++++++++++
more on MediaSpace in this IMS blog
https://blog.stcloudstate.edu/ims?s=mediaspace

1 292 293 294 295 296 491