Friday, December 11, 2009
Final Project
Wednesday, December 9, 2009
How do you manage the use of technology peripherals with students? What are some things you’ve learned and hope to implement?
The technology peripherals that we currently use in seventh grade Humanities are Skype and student and teacher blogs. Both are powerful applications for connecting students to learning networks outside the classroom. In addition, I envision that very soon our students will all have their rss reader and their own personal web.
Monday, December 7, 2009
How relevant are the NETS for teachers and administrators for being a good educator today?
The classroom of tomorrow is already here. In it, students are exploring real-world problems using digital tools and online resources. In many ways, the classrooms of today resemble current global networks. In the classroom and in the outside world, networks of informed and committed people are studying real-world issues and solving authentic problems. Thus, the NETS are highly relevant standards to preparing students for their lives once they leave the classroom and enter the world beyond.
One of the hallmarks of real-world networks is constructing knowledge in collaborative groups. Of course, that is also one of the NETS. In today’s NETS-based classrooms students are provided numerous opportunities to construct their knowledge working collaboratively with others. In fact, the power of many digital tools is that they are tailor made for people working collaboratively.
An important part of working with others in both in the classroom and the real-world is the safe, legal, and ethical use of digital information and technology. Students need to understand copyright laws and fair use standards and follow and respect them in their work just as adults do in the real-world.
Finally, a critical element for members in global learning networks is trust. As network theorist Karen Stephenson has written, “It takes twenty years to build trust and two minutes to destroy it.” Therefore, students really need to learn how to be responsible in their social interactions while working in classroom collaborative groups and online networks. Thus, NETS standards are not only relevant to teachers and administrators, they are a critical element in delivering an education that prepares students for the world that they will enter after the classroom.
.
What are ways you manage the use of laptops in your classroom and what additional best practice ways might you add?
One of the easiest ways to manage use of laptops in class is to have students put their lids down when the teacher is talking to them or when they should be doing anything other than working on the laptop. Another tool that we use in grade seven is to assign each student a specific cart and computer to use. This trick allows teachers to easily find out who has not plugged in their laptop when finished with it. A penalty could be given for chronic failure to plug in laptops.
Whose job is it to teach the NETS and AASL standards to students?
It seems that the job of teaching NETS and ASSL standards to students falls on the shoulders of the teachers. They are the ones in daily contact with students and they have an understanding of how technology is to be embedded in the respective grade-level curriculums. By teachers, I mean all instructional staff including IA’s.
Sunday, December 6, 2009
How can teachers and schools ensure that their students are learning what they need when it comes to technology and information literacy?
Excellent question – where to start? Let’s start with information literacy. In my opinion, the best way to ensure that our students are learning what they need in terms of information literacy is to offer all students truly differentiated instruction. No one would argue that ISB classrooms are not mixed ability classrooms. Just spend five minutes talking to students and it becomes apparent that each student is different from the others in terms of readiness, experience, interest, intelligences, language, culture and mode of learning.
In the differentiated classroom all students would be actively involved in the inquiry process anchored in a concept-based unit and would all be working toward answering the same essential questions and developing the same enduring understandings. The differentiated classroom would offer students both a classroom text set as well as a web-based text set. These text sets would provide each student many avenues to acquiring content that are appropriate in terms of each student’s readiness, experience, intelligence, interest, language background, culture and mode of learning.
In summary, teachers need to ask themselves whether they are meeting each student where s/he is at or are they insisting that students modify themselves to fit the curriculum. If students are provided with a truly differentiated classroom they are more likely to maximize their learning.
Saturday, October 31, 2009
Digital Story
WRITING LEADS FOR YOUR ESSAYS
· What made the lead boring?
· What did the lead make you wonder?
· What details does the lead include?
· How could this lead be improved?
· Which lead would you choose? Explain why.
See: http://voicethread.com/?#u556664
Friday, October 30, 2009
Reflection on Improving a Past Presentation With Visual Images
A presentation that I have done in the past is one on the characteristics of a good essay. In this presentation I would use an exemplary essay to explain to students these important characteristics:
* Momentum is built in the opening.
* There is movement and flow throughout.
* It sticks to the topic.
* It brings you back to an earlier point in the essay.
* It leaves you with something memorable.
However, the above procedure is top-heavy with teacher talk and could be vastly better with the addition of just the right video. An idea that I got from Dr. Roger Everett is to use various activities or sports as metaphors for a good essay. Some of these activities/sports are: a roller coaster ride; scuba diving; a small airplane ride; flying a kite; and car racing.
Dr. Everett shows his students a YouTube video of a good roller coaster ride. Coincidently, a good roller coaster ride has exactly the same qualities of a good essay given above. (For the third bullet point substitute the word tracks for the word topic.)
After having the class view the video twice, students in small groups can come up with their own examples of metaphors for good essays and present them to the class. The class can then read and analyze an essay to see if it has the above characteristics. Take a look at a video of a roller coaster ride to see if it demonstrates the characteristics of a good essay.
Final Reflection
This course has given us the opportunity to discover and experience using many visual tools that can be incorporated into our teaching. Everyone clearly understands the power of using visual images whether they be in advertising, entertainment or the teaching field. We all know from experience that visual images have the power to capture our attention like no text can.
FINAL PROJECT REFLECTION
The team 7 final project involved students making a SmartMovie to help them learn 20 geography terms that they would subsequently need to know for the “Create an Island” Project. In the Create an Island Project students are meant to create an island community which involves positioning the island at a latitude and longitude that would support the crops and agriculture to sustain the size of the community - in part determined by the island’s area. Students will also need to place needed landforms on the island and have an understanding of its climate.
Sunday, October 25, 2009
How could Screencast be used in your classroom/department?
In our Humanities 7 classroom we recently had the students learning geography and mapping concepts such as: latitude, longitude, locating a city using latitude and longitude, the Prime Meridian, the International Dateline, the tropics, the temperate zones, the eight cardinal points of the compass, the difference between weather and climate, the effect of elevation on temperature and climate.
How has the explosion of web-based video changed the teaching/learning landscape?
In a piece in the New York Times from November 23, 2008, Kevin Kelly writes, “When technology shifts, it bends the culture.” According to Kelly, a new “distribution-and-display technology is nudging aside the book and catapulting images, especially moving images to the center of the culture.” To make his point, Kelly mentions that there were over 10 billion views of YouTube in September, 2008!
So what is fueling this exploding technology of moving images? Kelly gives us the “great hive-mind of image creation” which has produced an enormous database of visual items for use in video. Flickr alone has three billion photos posted on the site. From these billions of existing images films are created image by image.
Once a film-maker has found the images s/he wants to use in the video, a “screen fluency” is needed to manipulate the individual images. The most proficient creators of video respond to other videos with their own new video using a Web site called Seesmic. The result of all of this video creation by millions of people who make up the hive mind is democratization of expression or as Kelly says, “The fluid and fleeting symbols on a screen pull us away from the classical notions of monumental authors and authority.”
How can visual imagery support my curricular content?


http://www.vvgeocivtrenches.com/images/maps/map.slave.trade.jpg
In addition to serving as background to reading texts, students use images, graphs, and charts from the Internet for their blog posts. The result is a richer product that engages students at a deeper level. However, the trick to teaching students to use images is for them to be extremely selective in their choice of images and words.
How have the Ed Tech courses to date changed my classroom this year?
The courses to date have changed my teaching by taking my classroom from primarily paper-based texts to electronic texts sourced from the Internet. A large portion of student reading material is now from texts found on the Internet. In addition, student writing is now done on a computer and then posted to the Internet as opposed to being printed on paper as in the past. This change to an Internet-based classroom has brought numerous benefits to my students.
Wednesday, May 13, 2009
Online Safety
Who's responsibility is it to teach students to be safe online?
Tuesday, May 12, 2009
Audio Books
A significant number of students in EAP classes in the MS are reading at least two grade levels below their grade. The purpose of this project was to provide these students with an audio recording of one of the novels that the whole class reads. The Little Prince, which is read in grade 8 humanities, was the novel chosen. Students participate in literature circle groups and are expected to take the following roles: Discussion Director, Literary Luminary, Word Wizard and Symbol Decoder.
Monday, May 11, 2009
Are we preparing students for a world of mass collaboration?
The essential questions for this week are excellent. They go right to the heart of what we want our students to be able to do in a world that is globally connected via the Web. It is easy to ask these essential questions but quite another thing to in fact prepare our students for a world of mass collaboration.
So let's begin our search for an answer to the essential questions with a look at just what is meant by “mass collaboration.” Most of us would answer that the premier means of mass collaboration today is via the Internet and the WWW. We only have to do a quick read of Kevin Kelly’s blog The Technium to understand how powerful the Web has become.
In his post, Evidence of an Emerging Superorganism, Kelly describes already achieved advances in global connectivity and networked computing: “In recent years, we've created supercomputers composed of loosely integrated individual computers not centralized in one building, but geographically distributed over continents and designed to be versatile and general purpose. This later supercomputer….is also called cloud computing because the tally of the exact component machines is dynamic and amorphous - like a cloud.”
Kelly notes that Google (surprise) is “hoping to scale up their cloud computer to encompass 10 million processors in 1,000 locations.” Kelly calls the sum of all cloud computers the “One Machine”. Okay, now we’re achieving economies of scale - not to mention a staggering amount of connectivity and computing power. So what else is currently on the horizon? Well, Kelly describes the One Machine as a “megasupercomputer composed of billions of sub computers.” Google’s piece of the One Machine is just that - merely a piece.
In existence today, Kelly’s One Machine is, “a vast machine of extraordinary dimensions. It is comprised of a quadrillion chips, and consumes 5 percent of the planet's electricity.” “Its size is growing close to 66% per year.” Yeow!!! Now we’re getting some significant economies of scale! So, what’s in store for this “One machine”?
What does the future hold for our One Machine friend? Let’s let Kelly have the last word here. “Cloud computers such as Google and Amazon form the learning center for the smart superorganism. Let's call this organ el Googazon, or el Goog for short. El Goog encompasses more than the functions of the company Google and includes all the functions provided by Yahoo, Amazon, Microsoft online and other cloud-based services.
El Goog is sucking in the smartest humans on earth to work for it, to help make it smarter. The smarter it gets, the more smart people, and smarter people, want to work for it. El Goog ropes in money. Money is its higher metabolism. It takes the money of investors to create technology that attracts human attention (ads), which in turns creates more money (profits), which attracts more investments. The smarter it makes itself, the more attention and money will flow to it.”
As we can see from the above description of El Goog, the most powerful mass collaboration network is now in existence. What our students need is to get connected to other people in this network and get involved in projects that are real and meaningful to them and that also have an impact on the lives of our global neighbors.
The recent Global Issues Network (GIN) conference at ISB was an excellent example of young people who are collaborating in meaningful projects with other young people around the world - via the Internet. All students can be involved in a project that inspires them. Ryan Hreljac founded the well building project, Ryan’s Wells, when he was six years old. As he said to our ISB students, “Even a six-year old boy can become involved and make an important difference in the lives of other people around the world.” Frankly, it is just this kind of involvement that our students must undertake.
Another example of students collaborating globally is the project-based learning of the Horizon Project, and the World is Flat. Our students already have the technology. We teachers need to connect them to meaningful projects and let them go to work.
Monday, April 27, 2009
What makes the Web so powerful?
Evidence of a Global Super Organism
By Kevin Kelly
http://www.kk.org/thetechnium/archives/2008/10/evidence_of_a_g.php
What makes the web so powerful? The answer to this question lies in the nature of the global super organism that humankind is currently building. Kevin Kelly, a pioneer in describing where humans and technology are headed, gives us a glimpse of what he calls the One Machine in the following excerpt from his blog post, “Evidence of a Super Organism.”
“In recent years, we've created supercomputers composed of loosely integrated individual computers not centralized in one building, but geographically distributed over continents and designed to be versatile and general purpose. This later supercomputer is called grid computing because the computation is served up as a utility to be delivered anywhere on the grid, like electricity. It is also called cloud computing because the tally of the exact component machines is dynamic and amorphous - like a cloud. The actual contours of the grid or cloud can change by the minute as machines come on or off line.
Google probably has the largest cloud computer in operation. According to Jeff Dean one of their infrastructure engineers, Google is hoping to scale up their cloud computer to encompass 10 million processors in 1,000 locations.
Whenever you are online, whenever you click on a link, or create a link, your processor is participating in the yet larger cloud, the cloud of all computer chips online. I call this cloud the One Machine because in many ways it acts as one supermegacomputer.
I define the One Machine as the emerging superorganism of computers. It is a megasupercomputer composed of billions of sub computers. The sub computers can compute individually on their own, and from most perspectives these units are distinct complete pieces of gear. But there is an emerging smartness in their collective that is smarter than any individual computer. We could say learning (or smartness) occurs at the level of the superorganism.
This megasupercomputer is the Cloud of all clouds, the largest possible inclusion of communicating chips. It is a vast machine of extraordinary dimensions. It is comprised of a quadrillion chips, and consumes 5% of the planet's electricity. It is not owned by any one corporation or nation (yet), nor is it really governed by humans at all. Several corporations run the larger sub clouds, and one of them, Google, dominates the user interface to the One Machine at the moment.
The phrase a "global superorganism” suggests the sustained integrity of a living organism, or a defensible and defended boundary, or maybe a sense of self, or even conscious intelligence.
The One Machine consumes electricity to produce structured information. Like other organisms, it is growing. Its size is increasing rapidly, close to 66% per year, which is basically the rate of Moore's Law. Every year it consumes more power, more material, more money, more information, and more of our attention. And each year it produces more structured information, more wealth, and more interest.
Cloud computers such as Google and Amazon form the learning center for the smart superorganism. Let's call this organ el Googazon, or el Goog for short. El Goog encompasses more than the functions of the company Google and includes all the functions provided by Yahoo, Amazon, Microsoft online and other cloud-based services.
El Goog is sucking in the smartest humans on earth to work for it, to help make it smarter. The smarter it gets, the more smart people, and smarter people, want to work for it. El Goog ropes in money. Money is its higher metabolism. It takes the money of investors to create technology that attracts human attention (ads), which in turns creates more money (profits), which attracts more investments. The smarter it makes itself, the more attention and money will flow to it.
El Goog and the One Machine offer intelligence without human troubles. In the beginning this intelligence is transhuman rather than non-human intelligence. It is the smartness derived from the wisdom of human crowds, but as it continues to develop this smartness transcends a human type of thinking.
While El Goog is constantly seeking chips to occupy, energy to burn, wires to fill, radio waves to ride, what it wants and needs most is money. So one test of its success is when El Goog becomes our bank. Not only will all data flow through it, but all money as well.”
There are several headlines that one can take from this blog. The one I like best is: “The One Machine is increasing in size at a rate of 66% a year. Every year it consumes more power, more material, more money, more information, and more of our attention. And each year it produces more structured information, more wealth, and more interest.” The One machine is simply the biggest example of Scenius ever. Scenius is a term coined by Brian Eno meaning: “…the intelligence and the intuition of a whole cultural scene. It is the communal form of the concept of the genius." Simply put, the web is an exponential explosion of the extreme creativity that people working in groups or scenes can generate.
Monday, April 20, 2009
Copyright laws
Do we as a global society need to rethink copyright laws?
As teachers, when we observe the tech habits of our students we often find exactly the behavior that Kevin Kelly so aptly describes in his blog post, “Technology Wants to be Free.” www.kk.org/thetechnium/
Sunday, March 29, 2009
Is There Privacy Online
Vast Spy System Loots Computers in 103 Countries
Are you concerned about your private information getting into the wrong hands out there on
the internet? You should be. An article in the New York Times dated March 29, 2009 gives us
all cause for concern.
According to the article: Researchers at the Munk Center for International Studies at the University of Toronto have discovered a vast electronic spying operation that has infiltrated at least 1,295 computers in 103 countries. In less than two years the spying operation has infiltrated computers belonging to embassies, foreign ministries and government offices including the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York.
The spy operation dubbed “GhostNet” by the Toronto researchers uses malware that is able to turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The GhostNet intruders had gained control of the electronic mail server computers of the Dalai Lama’s organization. One recipient of an email from the Dalai Lama’s exile center was arrested upon her return to China and warned not to get involved with the exile center’s activities.
Three of the four control servers used by GhostNet were traced to different provinces in China — Hainan, Guangdong and Sichuan — while the fourth was found to be at a Web-hosting company based in Southern California. Last year, one of the researchers, Nart Villeneuve who is a “white-hat” hacker with “dazzling technical skills” linked the Chinese version of the Skype communications service to a Chinese government operation that was systematically eavesdropping on users’ instant-messaging sessions.
Shishir Nagaraja and Ross Anderson, two researchers from Cambridge, England who helped the Toronto researchers, wrote in their report titled, The Snooping Dragon: Social Malware Surveillance of the Tibetan Movement: “What Chinese spooks did in 2008, Russian crooks will do in 2010 and even low-budget criminals from less developed countries will follow in due course.”
Since sophisticated hackers always seem to be one step ahead of security companies, it appears that none of us is safe from having our computers broken into and data stolen. Maybe the best strategy is to assume that there is no privacy online and that all of our most sensitive personal information and data will eventually be available to anyone and everyone on the net.
Monday, March 23, 2009
Digital Footprints
When and where should we be teaching students about their digital footprint?
How many of us are ready to submit to the total surveillance that Mr. Finkelstein believes comes with total personalization?
“Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens.” https://www.torproject.org/
There are many reasons to use web proxies, such as security (firewalling), efficiency (caching) and others, and there are any number of proxies to accommodate those needs.
Privoxy is a proxy that is primarily focused on privacy enhancement, ad and junk elimination and freeing the user from restrictions placed on his activities. Sitting between your browser(s) and the Internet, it is in a perfect position to filter outbound personal information that your browser is leaking, as well as inbound junk. It uses a variety of techniques to do this, all of which are under your complete control via the various configuration files and options. Being a proxy also makes it easier to share configurations among multiple browsers and/or users.” http://www.privoxy.org/faq/general.html#PROXYMORON
Saturday, February 28, 2009
Final Reflection
I believe that the important learning from my apartheid unit project will come when it is implemented in the classroom. I think that much of the eighth grade humanities learning is, in a sense, “confined” to the classroom. That is, while students read texts, view videos, listen to audio, blog with other students and create wikis with other students, there is no live contact or feedback from people outside our classroom. The work that Julie Lindsay and her colleagues have done serves as a model for creating networks of our students along with other students, teachers and adults from around the world.
Course Reflection
I really appreciate the chance to have taken this course. Our teachers, Kim Cofino and Jeff Utecht, have done a tremendous job of launching and guiding us on our journey into the future. Such a varied group we are in terms of life experiences and interests!
Thursday, February 26, 2009
What I have learned
Messing Around
This article emphasizes the three components of differentiated learning: differentiation for interest, learning profile and for readiness.
Students learning about the new media are learning from and collaborating with others in social exchanges. (learning profile)
Messing around with the new media requires an interest-driven orientation… (interest) Messing around is largely self-directed. (interest)
Youth often seek support from their local friendship network. (learning profile)
We can conclude that messing around thus provides valuable learning that incorporates material that meets each student’s readiness level, interest area and learning profiles.
Connectivism
I like the recap in this article of the three learning theories Behaviorism, Cognitivism and Constructivism. However, I think the article goes overboard when it states, “These theories do not address learning that occurs outside of people (i.e. learning that is stored and manipulated by technology). They also fail to describe how learning happens within organizations. “
Any teacher knows that students learning within the Constructivist umbrella are learning in groups of two, three and other small configurations. They are also accessing information that is stored in books, magazines, and on the Internet. (technology)
The powerful advantage of Connectivism is that is allows the learner in a network to readily access the knowledge of all the members of the network. When individual networks are connected other networks then the amount of learning available is greatly magnified.
Bloom’s Taxonomy
I love the reformulation of Bloom’s Taxonomy done by Lorin Anderson: Remembering, Understanding, Applying, Analysing, Evaluating, Creating. The new terms make the process more readily applicable in the classroom. The digital translations of each of the levels in the taxonomy are also valuable. For example, in the digital arena Creating becomes: designing, constructing, planning, producing, inventing, devising, making, programming, filming, animating, blogging, video blogging, mixing, re-mixing, wiki-ing, publishing, video-casting, podcasting, directing/producing.
Overall, this article is a great summary of how using digital materials can take student learning to the higher levels of Bloom’s Taxonomy.
Here Comes Everybody
Clay Shirkey
The most important reading that I have done these past few weeks is Clay Shirkey’s, Here Comes Everybody: The power of Organizing Without Organizations.
This book gives real life examples of how groups of people working outside established organizations have accomplished tremendously important goals. Creating an all-volunteer online encyclopedia and bringing down the government of East Germany are two stellar examples.
When learning about new technology applications it is easy to get lost in the excitement of their newness without understanding the big picture. Shirkey’s book lets us understand how networks of people outside organizations have used the latest technology applications.The important point is really what powerful things networked people can do with technological tools. The book is an invaluable big picture look at networks and the technology that facilitates their connectivity and effectiveness.
The World is Spiky
Many of us are firm believers in networks and in the power of technology to bring us closer to the members of our networks. This belief underlies one of the big ideas of Thomas Friedman’s book, the World is Flat: the exponential technology innovations of the digital revolution have made it possible to do business or otherwise collaborate instantaneously with billions of people around the globe. Moreover, the effect of these technology innovations is to level the global playing field thereby making everyone a player.
Freedom Unit Sketch
Standards Met
Students will blog regularly about their learning and will also respond to a blog written by the group or advocates of the group that they are taking action for. In addition, the class will create an online hypertext resource on the concept of freedom. Students working either alone or with a small group will make a short video (to be posted on YouTube) about their project and the action that they are taking.