U.S. Education Secretary spared no words in her critique of education reform efforts during the Bush and Obama administrations. “I don’t think there is much we can hold onto, from a federal level, that we can say was a real success,”
This is not the first time DeVos has praised personalized learning. The education secretary visited Thomas Russell Middle School in Milpitas, Calif
Her vision of personalized learning has plenty of detractors. Educators and administrators have already begun to voice their reservations about personalized learning in schools. At a gathering of educators in Oakland last October speakers decried what they described as the privatization of public education through the introduction of technology initiatives such as personalized learning. More recently, former AltSchool educator Paul Emerich wrote a blog post titled, “Why I Left Silicon Valley, EdTech, and ‘Personalized’ Learning,” where he offered critiques of the personalized learning movement in his school. The post touched on concerns about his workload and interactions with students.
Parents are raising pressure too. In at least two states, their concerns over screen-time and digital content used in online educational platform has forced districts to suspend the implementation of technology-enabled personalized learning programs such as Summit Learning.
De Vos pointed to previous federal-led education funding programs as a “carrot” that made little or no impact. Her critique is not unfounded: A report published last year by the Education Department’s research division found that the $7 billion School Improvement Grants program made “no significant impacts” on test scores, high school graduation rates or college enrollment.
Common Core is currently adopted in 36 states, according to EdWeek’s Common Core Tracker, last updated September 2017.
++++++++++++++++
DeVos: ‘Common Core Is Dead’; A Large Online Charter School Is Shut Down
One of the largest online charter schools in the country closed this week amid a financial and legal dispute with the state of Ohio.
Education Secretary Betsy DeVos in a keynote address this week to the American Enterprise Institute.
She also cited a survey by the American Federation of Teachers that 60 percent of its teachers reported having moderate to no influence over the content and skills taught in their own classrooms. That same survey also noted that 86 percent of teachers said they do not feel respected by DeVos.
Blockchain technology has the potential to enhance the role played by libraries within their communities, however, there are many questions yet to be answered about how specifically blockchain technology might be used and how much value it would add to library services and the communities they serve. Ideas from within the information profession are needed as we formulate recommendations for the profession.
The San José State University School of Information (iSchool) received an IMLS grant to investigate ways that blockchain technology can be used by libraries as a community anchor to partner with other organizations and to support city/community goals. Some suggestions for blockchain applications in libraries include building an enhanced metadata center, protecting Digital First Sale rights, supporting community-based collections, facilitating partnerships across organizations, and more.
The year-long project will provide three opportunities for a national dialog among technical experts in libraries, blockchain technology, and urban planning and members of the information professions to discuss ways that blockchain technology can advance library services to support city/community goals.
The project website and blog includes information and resources about blockchain technology, potential uses of blockchain technology by libraries, and project updates along with a blog to foster open dialog. Seehttps://ischoolblogs.sjsu.edu/blockchains/
The National Forumscheduled for August 6, 2018 in San Jose, CA will be comprised of 20-30 technical experts in libraries, blockchain technology, and urban planning to identify and discuss key opportunities for libraries to serve as community anchors using blockchain technology.
The Library 2.018 conference, Blockchain Applied: Impact on the Information Profession, is designed for presentations and discussion on the uses of blockchain technology in libraries. Registration in this open online conference is free to the profession and public. Scheduled on June 7, 2018 from 12:00 – 3:00 pm PDT. The call for proposals is located on the conference website.
We are seeking nominations of individuals to represent the professional associations (e.g. LITA, PLA, ULC, CLIR, ARL) and information organizations by participating in the National Forum in San Jose, CA (August 6, 2018). Funding provided by IMLS is available to support most of the expenses (travel, lodging, meals) for the National Forum for invited participants.
Nominations (including self-nominations) are due by February 15, 2018. Nominees should be knowledgeable about blockchain technology and libraries in order to have an impact on the recommendations that will be made and discussed during the Library 2.018 conference and National Forum.
Nominations to participate in the Blockchain National Forum should be submitted by February 15 using this Google Form.
at RMG’s Annual Presidents’ Seminar:
The View from the Top on Friday February 9, 2018, 2:00 p.m. – 4:00 p.m.
ALA Midwinter Conference, Denver Colorado Convention Center Room 505
Who, When, Where?
How will these disruptive technologies enter the
Library Industry ?
Who will lead the innovation?
And what about Robots, Blockchain, and the loss of Net Neutrality?
How will Artificial Intelligence and Self-Driving Cars improve library services and performance?
• In the age of click and digital download, will driverless library (or Uber or Lyft) delivery services plus robots-to-the-door put printed books and other physical items into readers’ hands with comparable ease? Or transport and escort readers to Library programs and browsing opportunities?
• Alexa: Please deliver to my weekend address the Hungarian cookbook I checked out from my Branch Library last year and fresh — not frozen — ingredients for goulash for six. Text me by Thursday if I can’t get all this by Friday 6pm. Also, could you recommend a suitable under $15 red wine available at my weekend Whole Foods?
• Siri or Alexa: Call the Library and make reservations for my two grandchildren and me for the February program on Spring solstice, and ask them to text each of us confirmations. Also, could you ask the Library to send them links to e-books that explain the history of astronomy? And deliver to Amy a book in English or Mandarin about ancient Chinese astronomy a week before the program?
The Seminar is open to everyone for dialogue on topical issues and concerns — registration is not required.
Attendees are invited to ask questions of Library Industry executives entrusted with delivering platforms and solutions for global library systems, services, and content to thousands of libraries serving millions of library users worldwide.
Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.
Learning Outcomes:
at the end of the session, participants will have an idea about gaming and gamification in education and will be able to discriminate between those two powerful concepts in education
at the end of this session, participants will be able search and select VIdeo 360 movies for their class lessons
at the end of the session, participants will be able to understand the difference between VR, AR and MR.
if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.
How would you define gamification of the educational process?
Gaming and Gamification in academic and library settings (paper) Short URL: http://scsu.mn/1F008Re
Gamification takes game elements (such as points, badges, leaderboards, competition, achievements) and applies them to a non-game setting. It has the potential to turn routine, mundane tasks into refreshing, motivating experiences (What is GBL (Game-Based Learning)?, n.d.).
Gamification is defined as the process of applying game mechanics and game thinking to the real world to solve problems and engage users (Phetteplace & Felker, 2014, p. 19; Becker, 2013, p. 199; Kapp, 2012). Gamification requires three sets of principles: 1. Empowered Learners, 2. Problem Solving, 3. Understanding (Gee, 2005).
Apply gamification tactics to existing learning task
split in groups and develop a plan to gamify existing learning task
from the web page above, choose a movie or click on this link: https://youtu.be/nOHM8gnin8Y (to watch a black hole in video 360) Open the link on your phone and insert the phone in Google Cardboard. Watch the video using Google Cardboard.
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.
My note:
This is another example of blanket statements aimed to bank on buzzwords and fashionable tendencies. Indeed, use of social media is an imperative skill for any educational leader, since it provides a modern venue to communicate with the rest of the stakeholders in the educational process: parents, students etc.
However, the process of social media use in education is rather more complex as presented in this article. e.g.:
why the hashtag use is the one and only altmetric consideration for deep data analysis? The author suggests taking “advantage of an analytic tool to measure effectiveness and participation,” but there is no specific recommendation and the choice of the analytical tool as well as the process of analysis is a science on its own
how educators, as suggested by the author, “want to guide students on comment intensity and type while keeping them on topic”? Indeed, an educator abiding by constructivism will facilitate and guide, yet there is a fine boundary between facilitating and dominating the conversation with “guidance.”
The most useless suggestion in the article:
“For administrators, Twitter chats also provide an opportunity to gain student and parent perspectives while giving them more voice in what’s going on within a school or district.”
Are administrators willing to yield that power to their constituency? What does the current research on educational leaders’s attitude reveal regarding their willingness to engage in such open (and difficult to control) discourse? How is such attitude to be changed: this is missing in this article.
What is your approach to the institutional use of social media at your school?
France’s data privacy watchdog may fine messaging app WhatsApp if it does not comply with an order to bring its sharing of user data with parent company Facebook into line with French privacy law.
Separately, Germany’s cartel office said on Tuesday it had found Facebook had abused its dominant market position, in a ruling that questioned the company’s model of monetizing the personal data of its users through targeted advertising.