Archive of ‘technology’ category

storytelling AR and VR tools

Unleash the Power of Storytelling With These New AR and VR Tools

By Jaime Donally (Columnist)     Apr 4, 2018

Teachers can bring VR stories into the classroom in many different ways for meaningful learning experiences. Imagine a scavenger hunt where students narrate a story based on what they find. Or consider using objects they see to identify vocabulary words or recognize letters. Students should have purpose in their viewing and it should directly connect to standards.

Starting with virtual reality, stories in apps such as Google Spotlight Storiesand YouTube 360 videos have been popular from the start.

Similar to the new movie, Ready Player One, they provide an intense experience where the viewer feels like they are in the center of the story.

Using a mobile device or tablet, the student can start the story and look around the scene based on their interest, rather than the cameras focus. New apps such as Baobab VR have continued to appear with more interactions and engagement.

A creative way to have your students create their own virtual stories is using the app Roundme. Upload your 360 image and add directional sound, links and content. Upload portals to walk the viewer into multiple scenes and then easily share the stories by link to the story.

Newer augmented reality apps that work with ARKit have taken another approach to storytelling.  Augmented Stories and My Hungry Caterpillar.Qurious, a company that is working on a release blending gaming, making and storytelling in one app.

Storyfab, turns our students into the directors of the show

A new AR book, SpyQuest, has moved the immersive experience a big step forward as it helps define the story by bringing the images to life. Through the camera lens on a device, the stories make students the agents in an adventure into the world of espionage. The augmented reality experiences on the images use the accompanying app to scan the scene and provide further insight into the story.

+++++++++++++
more on storytelling in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+storytelling

more on VR and storytelling in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality+storytelling

 

audio recording and editing

5 Audio Recording Tools Compared – 2018 Chart-13pizlw

Anchor.fm

vocaroo.com  (creates QR code to the recording session)

audacityteam.org

apple.com/mac/garageband/

twistedwave.com

+++++++++
more on audio recording in this IMS blog
https://blog.stcloudstate.edu/ims?s=audio+recording

https://blog.stcloudstate.edu/ims?s=audio+edit

https://blog.stcloudstate.edu/ims?s=podcast

 

history programming languages

A Brief History of Computer Programming Languages [#Infographic]

Who contributed to the code that we use every day?

by Jimmy Daly APril 19, 2013

https://edtechmagazine.com/higher/article/2013/04/brief-history-computer-programming-languages-infographic

history of coding

+++++++++++++++
more on coding in this IMS bog
https://blog.stcloudstate.edu/ims?s=coding

microcredentialing degrees

In Evolving World of Microcredentials, Students, Colleges and Employers Want Different Things

By Jeffrey R. Young     Jan 23, 2018

https://www.edsurge.com/news/2018-01-23-in-evolving-world-of-microcredentials-students-colleges-and-employers-want-different-things


++++++++++++++++++++
more on microcredentialing in this IMS blog
https://blog.stcloudstate.edu/ims?s=badges

Editing in MediaSpace

Editing in MediaSpace

From the MnSCU Innovation Office:

Clipping and Trimming Tools Changes January 14

Kaltura is updating the clipping and trimming tool for all customers on Sunday, January 14th.  A new, HTML5, video editor tool will be available to all users of the Minnesota State instance of Kaltura Mediaspace.

To learn how you can use this video editor tool to make changes to videos or in-video quizzes, watch this video or review the video editor user guide.

Please consider that with your STAR ID, you have access to two MediaSpace

+++++++++++
more on MediaSpace in this IMS blog
https://blog.stcloudstate.edu/ims?s=mediaspace

cybersecurity threats for schools

The top 5 cybersecurity threats for schools

BY EARL D. LAING November 29th, 2017
https://www.eschoolnews.com/2017/11/29/cybersecurity-threats-schools/

1. Link Security

From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.

Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.

2. Unknown Devices

Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.

3. Out of Date Technology

Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.

Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.

4. User Error

A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.

User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.

Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.

5. No Backup

As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.

Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.

+++++++++++++++
more on cybersecurrity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

ECAR Study of Undergraduate Students and Information Technology, 2017

ECAR Study of Undergraduate Students and Information Technology, 2017

  • Students would like their instructors to use more technology in their classes.Technologies that provide students with something (e.g., lecture capture, early-alert systems, LMS, search tools) are more desired than those that require students to give something (e.g., social media, use of their own devices, in-class polling tools). We speculate that sound pedagogy and technology use tied to specific learning outcomes and goals may improve the desirability of the latter.
  • Students reported that faculty are banning or discouraging the use of laptops, tablets, and (especially) smartphones more often than in previous years. Some students reported using their devices (especially their smartphones) for nonclass activities, which might explain the instructor policies they are experiencing. However, they also reported using their devices for productive classroom activities (e.g., taking notes, researching additional sources of information, and instructor-directed activities).

++++++++++++++
more on ECAR studies in this IMS blog
https://blog.stcloudstate.edu/ims?s=ecar

1 54 55 56 57 58 100