Acclaim, Badger, Badge List, Credly, CSULogics, and Red Critter
Acclaim and Credly merged. CSULogics seems CCCS native; pls advise if I need to contact them nevertheless. Badgr is now with Canvas, but I still think we need to explore the options with other LMS, such as D2L.
From: Hank from Badge List <hank.holiday@badge-list.intercom-mail.com> Reply-To: Hank from Badge List <hank.holiday@badge-list.intercom-mail.com> Date: Friday, April 26, 2019 at 4:53 PM To: Plamen Miltenoff <pmiltenoff@stcloudstate.edu> Subject: Re: Discuss a setup of microcredentialing system
Please look that over and we can help you via email if you have any questions.
Cheers,
– Hank
From: Ben from Badge List <ben.roome@badge-list.intercom-mail.com> Reply-To: Ben from Badge List <ben.roome@badge-list.intercom-mail.com> Date: Monday, April 29, 2019 at 5:30 PM To: Plamen Miltenoff <pmiltenoff@stcloudstate.edu> Subject: Re: Discuss a setup of microcredentialing system
Hi Plamen,
We’d love to get on a call but unfortunately we can’t spend those time resources on accounts that generate below $4,950 per year. Does your budget meet those requirements? If so we’d be happy to schedule a conversation.
the emphasis (strong side) is the streamlining of the different offices and activities on campus
levels of proficiency is very much geared toward undergrads
aspects of gamification, but no peer support credit/badge
U of Pittsburgh – OCC outside the class curriculum
Monclair U (NJ second largest):
U of Wyoming: after level 3, career coach does storytelling appointment.
pilot is $5K and institutional can vary between $10-15K
https://sched.co/JAqk
the type of data: wikipedia. the dangers of learning from wikipedia. how individuals can organize mitigate some of these dangers. wikidata, algorithms.
IBM Watson is using wikipedia by algorythms making sense, AI system
youtube videos debunked of conspiracy theories by using wikipedia.
semantic relatedness, Word2Vec
how does algorithms work: large body of unstructured text. picks specific words
lots of AI learns about the world from wikipedia. the neutral point of view policy. WIkipedia asks editors present as proportionally as possible. Wikipedia biases: 1. gender bias (only 20-30 % are women).
conceptnet. debias along different demographic dimensions.
citations analysis gives also an idea about biases. localness of sources cited in spatial articles. structural biases.
geolocation on Twitter by County. predicting the people living in urban areas. FB wants to push more local news.
danger (biases) #3. wikipedia search results vs wkipedia knowledge panel.
collective action against tech: Reddit, boycott for FB and Instagram.
data labor: what the primary resources this companies have. posts, images, reviews etc.
boycott, data strike (data not being available for algorithms in the future). GDPR in EU – all historical data is like the CA Consumer Privacy Act. One can do data strike without data boycott. general vs homogeneous (group with shared identity) boycott.
the wikipedia SPAM policy is obstructing new editors and that hit communities such as women.
how to access at different levels. methods and methodological concerns. ethical concerns, legal concerns,
tweetdeck for advanced Twitter searches. quoting, likes is relevant, but not enough, sometimes screenshot
engagement option
social listening platforms: crimson hexagon, parsely, sysomos – not yet academic platforms, tools to setup queries and visualization, but difficult to algorythm, the data samples etc. open sources tools (Urbana, Social Media microscope: SMILE (social media intelligence and learning environment) to collect data from twitter, reddit and within the platform they can query Twitter. create trend analysis, sentiment analysis, Voxgov (subscription service: analyzing political social media)
graduate level and faculty research: accessing SM large scale data web scraping & APIs Twitter APIs. Jason script, Python etc. Gnip Firehose API ($) ; Web SCraper Chrome plugin (easy tool, Pyhon and R created); Twint (Twitter scraper)
Facepager (open source) if not Python or R coder. structure and download the data sets.
TAGS archiving google sheets, uses twitter API. anything older 7 days not avaialble, so harvest every week.
social feed manager (GWUniversity) – Justin Litman with Stanford. Install on server but allows much more.
legal concerns: copyright (public info, but not beyond copyrighted). fair use argument is strong, but cannot publish the data. can analyize under fair use. contracts supercede copyright (terms of service/use) licensed data through library.
methods: sampling concerns tufekci, 2014 questions for sm. SM data is a good set for SM, but other fields? not according to her. hashtag studies: self selection bias. twitter as a model organism: over-represnted data in academic studies.
methodological concerns: scope of access – lack of historical data. mechanics of platform and contenxt: retweets are not necessarily endorsements.
ethical concerns. public info – IRB no informed consent. the right to be forgotten. anonymized data is often still traceable.
table discussion: digital humanities, journalism interested, but too narrow. tools are still difficult to find an operate. context of the visuals. how to spread around variety of majors and classes. controversial events more likely to be deleted.
takedowns, lies and corrosion: what is a librarian to do: trolls, takedown,
development kit circulation. familiarity with the Oculus Rift resulted in lesser reservation. Downturn also.
An experience station. clean up free apps.
question: spherical video, video 360.
safety issues: policies? instructional perspective: curating,WI people: user testing. touch controllers more intuitive then xbox controller. Retail Oculus Rift
app Scatchfab. 3modelviewer. obj or sdl file. Medium, Tiltbrush.
College of Liberal Arts at the U has their VR, 3D print set up.
Penn State (Paul, librarian, kiniseology, anatomy programs), Information Science and Technology. immersive experiences lab for video 360.
CALIPHA part of it is xrlibraries. libraries equal education. content provider LifeLiqe STEM library of AR and VR objects. https://www.lifeliqe.com/
libraians, IT staff, IDs. help faculty with course design, primarily online, master courses. Concordia is GROWING, mostly because of online students.
solve issues (putting down fires, such as “gradebook” on BB). Librarians : research and resources experts. Librarians helping with LMS. Broadening definition of Library as support hub.
zSpace is a technology firm based in Sunnyvale, California that combine elements of virtual and augmented reality in a computer. zSpace allows people to interact with simulated objects in virtual environments as if they are real.[1][2][3]
Give your students the chance to learn science in an engaging and effective way with Labster’s virtual labs.
Labster offers students a true-to-life lab experience at a fraction of the cost of a real lab.
You can supplement your teaching with virtual labs to prepare your students for the wet lab, to help them understand difficult concepts, to engage them with your science course, and more.
n our virtual lab simulations, students work through real-life case stories, interact with lab equipment, perform experiments and learn with theory and quiz questions.
Thanks to engaging 3D animations, students can explore life science at the molecular level and look inside the machines they are operating. https://www.labster.com/why-choose-labster/
Coiner of the term “Digital Native” and author of seven books and over 100 essays, Marc has spoken in over 40 countries, and his writings have been translated into a dozen languages. He currently promotes a new civilization-level alternative in global education, championing an emerging new “Real-World-Impact Education” paradigm that more directly benefits students and the world in which they live.
Previously in his career Marc taught French, mathematics and music and headed an alternative school in New York City, worked as a consultant at the Boston Consulting Group (and was its first Product Development Director), and founded and ran a computer game company. Marc holds an MBA degree from Harvard, with distinction, and a Master of Arts in Teaching degree from Yale.
his new education plan would work in practice. What would it take to get there from here?
Digital Humanities Workshop with Marina Rustow – February 28
1:30 – 3:00 p.m.
Wallin 15K (Elmer L. Andersen Library, lower level), University of Minnesota
Graduate students: Join us for a Digital Humanities Workshop with Marina Rustow, History & Near Eastern Studies, Princeton. Learn more here. Co-sponsored by the Center for Medieval Studies, DASH, and the James Ford Bell Library.
Thousands of people, from kids to teachers to big brands, are creating all kinds of Augmented Reality Experiences (games, interactive stories, educational curriculum, scavenger hunts, RPGs and much more!)
Do we need to pay for services such as Turnitin? Are there comparable services for free? Do we need services such as those ones or we rather have faculty and students educated on plagiarism and faculty trained to detect plagiarism? Is it supposed to be a “mechanical” process or educational activity?
These questions following a posting of today from the Educause Blended and Online Learning Group
Are any of you using a non-Turnitin plagiarism checker that you’re happy with (besides Google or Grammarly’s free service)?
Thanks,
Jenn Stevens (she, her, hers)
Director, Instructional Technology Group
403C Walker Building
Emerson College | 120 Boylston St | Boston, MA 02116
(617) 824-3093
At Ursinus, we use PlagScan, which is affordable and meets our needs.
We haven’t been able to get it to fully integrate within our LMS yet but hopefully we will be able to soon.
Christine Iannicelli
Instructional Technology Librarian
Library and IT
Library 124
Phone: 610-409-3466 ciannicelli@ursinus.edu
Submissions are invited for the IOLUG Spring 2019 Conference, to be held May 10th in Indianapolis, IN. Submissions are welcomed from all types of libraries and on topics related to the theme of data in libraries.
Libraries and librarians work with data every day, with a variety of applications – circulation, gate counts, reference questions, and so on. The mass collection of user data has made headlines many times in the past few years. Analytics and privacy have, understandably, become important issues both globally and locally. In addition to being aware of the data ecosystem in which we work, libraries can play a pivotal role in educating user communities about data and all of its implications, both favorable and unfavorable.
The Conference Planning Committee is seeking proposals on topics related to data in libraries, including but not limited to:
Using tools/resources to find and leverage data to solve problems and expand knowledge,
Data policies and procedures,
Harvesting, organizing, and presenting data,
Data-driven decision making,
Learning analytics,
Metadata/linked data,
Data in collection development,
Using data to measure outcomes, not just uses,
Using data to better reach and serve your communities,
Smartphones also provide an easy way for teachers to “inspire students to positively contribute to and responsibly participate in the digital world,” as espoused by the ISTE Standards for Educators.
research shows that when students are engaged in their learning — and they’re almost always engaged with their phones when given a choice — they are less likely to succumb to distractions.
1. Create short videos.
Videos can express any type of learning in any style, from music videos to interviews, book trailers, historical re-enactments, tutorials and stop animations.
Flipgrid is the one of the best educational video-creation sites
Gartner predicts that nearly 38 percent of companies will stop providing devices to workers by 2017 — but 20 percent of those BYOD programs will fail because of overly restrictive mobile device management measures. So how can IT pros devise a BYOD strategy that stays afloat? Here are six guidelines to accommodate legitimate IT concerns without sinking a policy’s odds of success:
Look to Existing Policies
Before creating a BYOD policy, take a look at existing HR and legal procedures. Many email, VPN, and remote access security policies can be applied to mobile devices, as well.
Provide Training and Education
Employees are using personal devices at work, whether the company realizes it or not. But that doesn’t mean they are using them correctly. Employees often use file-sharing and other tools of their choosing without IT’s knowledge, which could put sensitive corporate data at risk. Use a BYOD policy to trainemployees how to correctly use their applications
Specify Devices
BYOD isn’t limited to smartphones. According to Gartner, a “new norm” is emerging in which employees manage up to four or five devices at work.
Enforce Passwords and Encryption
passwords aren’t foolprool. Data encryption is an additional security measure
A smart BYOD policy doesn’t mean IT is off the hook. Rather, successful policies rely on IT and employees sharing security obligations.
Set Ownership Expectations
Employees often fail to realize that all data on their devices is discoverable, regardless of whether the device is personal or company-owned. The question of who owns what is still a legal gray area, though companies increasingly take the liberty to remote wipe employees’ personal devices once they leave their job. Avoid the guessing game with a clear exit strategy.
These tools are used not only to lock down your security and anonymity on the known internet, but also to access the portions of the internet that are normally hidden — “The Dark Web.”
TAILS is an acronym for “The Amnesic Incognito Live System.”
TAILS is a highly-secure operating system (and a host of cool applications) designed to be booted off of a DVD or USB thumb drive. This not only makes TAILS easy to transport, but also ensures that TAILS can be booted and instantly useful from nearly any PC, Mac, or Chromebook. TAILS is built on Linux, a name you might recognize because it’s a popular, free, and open-source operating system that’s been available since 1991. TAILS, in particular, runs on a variant of Linux known as “Debian,” which became available in 1996.
Third and most importantly, when setup correctly, TAILS helps ensure that all of your communications — email, web browsing, chat, and more — are encrypted, made anonymous, and then routed in such a way that it’s extremely difficult to detect or trace them.
Its unique approach to offering such well-regarded security is the creative use of two virtual machines (or VMs) running in tandem on one host computer. One of these VMs is known as the Gateway while the other is known as the Workstation.
Compared to TAILS, Whonix only provides a few free, open-source applications and those need to be set up fairly extensively. The list includes:
The TOR browser, for safe web browsing
Firefox, for less secure web browsing
Icedove, for emailing, secured by the Enigmail extension to encrypt and authenticate emails using a well-know and secure protocol called “OpenPGP”
HexChat, for internet chats
VLC, to open and view every kind of video file that’s ever existed