New PEW study – Technology in Classrooms

Good read


Leave a comment

Filed under Uncategorized

Another fine book to read

The End of Big: How the Internet Makes David the New Goliath (Hardcover)


Leave a comment

Filed under Reading list

Why we use textbooks

From David Warlick’s blog on teaching and learning — a thought-provoking essay (wait, I am redundant), an essay discussing the utilities of a textbook.  Lots of ideas that may provoke many more essays, hopefully to learn why we use texts, how texts may transform, what we should do about texts whose cost exceed both present and future value….  But, nonetheless, lots of ideas…  like:

The job of the teacher would be to locate (or cause to be located) and attach content (both open-source and/or commercial), in any appropriate format, to that arrangement of scope and sequence-forming tags and constantly filter and refine that content based on changing conditions and newly available content?

What might this process look like as an integral part of teacher education?  Might the act of starting their own flexible digital textbooks be a part of learning to teach.  (Is “Flexbook” trademarked?  How about “flexibook?”)

Leave a comment

Filed under Uncategorized

My daughter has entered the blogosphere and Why we write

Seems like yesterday, I lifted Caiti up to place the star on the family Christmas tree.  Now she enters the blogosphere, and writes about her fear of heights and why she writes.

Dave Winer discusses the power of writing as it is an exercise in thinking.  Dave Winer is one of the creators of the blogosphere.  I started blogging 12 years ago using one of his first blog products, Radio UserLand.

Which reminds me of other good readings about why we (should) write:

Writing is purpose-driven thinking.  Writing is hard work.  Writing can be exegesis for the curious and an occlusion of reality for the escapist.

Here’s to good thoughts, good writing, and a mastery of the outputs of her amygdala!

Leave a comment

Filed under Uncategorized

MOOCs Rising?

Three articles — focused on San Jose’s project to use MOOCs….

California State U. Will Experiment With Offering Credit for MOOCs

Courses in the pilot project are aimed at high-school students and students enrolled at community colleges in the state.

Faculty members will retain the intellectual-property rights to the course materials, said Ms. Junn.

Udacity’s Credit Path

The American Council on Education (ACE) said it would evaluate four Udacity courses, all of which are entry-level, for credit recommendations. And San Jose State University announced a deal to jointly offer three $150 courses with Udacity, in a trial run enrolling 300 students.

Davidson is gracious enough not to say so, but the dirty little secret we all know is that the massive lecture was only ever an economic expedient; it was never a particularly effective way to teach.  Replacing one economic expedient with another, more effective one hardly constitutes an outrage.  

Turning In To the Skid

Davidson is gracious enough not to say so, but the dirty little secret we all know is that the massive lecture was only ever an economic expedient; it was never a particularly effective way to teach.  Replacing one economic expedient with another, more effective one hardly constitutes an outrage.

Leave a comment

Filed under Higher Ed Changes, MOOCs

MOOC lessons learned

Good read

Teaching a MOOC: Lessons Learned & Best Balch Practices

Leave a comment

Filed under Uncategorized

Reading list

no time to talk — bunch of books here you will want to check out


Leave a comment

Filed under Uncategorized

Outlines and Lists a way to teach

Searls provides arguments supporting the idea that people want lists, not stories.

Are outlines a good way to present arguments, lessons, so that students can see the connection, the logic, supporting the arguments?


Leave a comment

Filed under Uncategorized

Intriguing thoughts on designing (anything) for the future


Found floating thru my twitter stream, Mr. Boyd discusses  “Speculative Design.”  Worth the read.  Some quotes of interest:

Jeff Hammerbacher’s observation that ‘the best minds of my generation are thinking about how to make people click ads’.

So, if the best minds of the 90’s created derivatives, shall we expect the same dynamic of calamities from the current focus?

We shouldn’t think about the future as a smooth, comfortable extrapolation of the mundane. We are over that. We have moved into the post-modern, where new norms prevail. Some characterize our new world as VUCA: unsurpassed levels of volatilty, uncertainty, complexity, and ambiguity.

Smooth sailing, no?

Is the political chaos and gridlock in the US a function of the liquifying political system? Our systems of governance are based on electing a very small number of people to represent all the rest. Can we cut out the middle man in politics like we have in buying books? What would web-mediated direct democracy work like? Feel like? Smell like? The Pirate Party in Europe is using a platform called Liquid Feedback, which is central to their inner workings, but is a speculative design for the rest of us.

Provocative thought!

Reconnecting people to their food will be huge.

And a means of “grounding” our local economies… Perhaps Boyd should run for office.

Rachel Armstrong said recently that the problem with ‘the future’ is that it’s not the future at all: it’s a version of now. It’s the distillation of predetermined cultural prejudices and preconceptions, it’s not a map, or even a good science fiction story.

But you can design revealing toys that explore our preconceptions, construct ‘imaginary appliances’ to help us trick our way out of the corner we have painted ourselves into. And it might be that the corners with the most paint — the hardest problem spaces — might be the most rewarding areas of exploration.

Enough said — To work!

Leave a comment

Filed under Uncategorized

Zero Day Exploits – time to pause internal development projects?

From the WP series on Zero Day:

In recent years, there has been one stunning revelation after the next about how such unknown vulnerabilities were used to break into systems that were assumed to be secure.

One came in 2009, targeting Google, Northrop Grumman, Dow Chemical and hundreds of other firms. Hackers from China took advantage of a flaw in Microsoft’s Internet Explorer browser and used it to penetrate the targeted computer systems. Over several months, the hackers siphoned off oceans of data, including the source code that runs Google’s systems.

Another attack last year took aim at cybersecurity giant RSA, which protects most of the Fortune 500 companies. That vulnerability involved Microsoft Excel, a spreadsheet program. The outcome was the same: A zero-day exploit enabled hackers to secretly infiltrate RSA’s computers and crack the security it sold. The firm had to pay $66 million in the following months to remediate client problems.

Makes one wonder how organizations are to develop their websites and applications and keep the secure.

Leave a comment

Filed under cybersecurity, Uncategorized