Saturday, 29 December 2007

Failed Internet Bookings, Community Projects and Mountain Biking

I have managed to get away from the City of Sails for the summer break. Oh the holidays! I travel south to the Garden City for some time to think, work on my scheme for the next year, to get some different ideas for units of work and get away from the rat race of work. I reflect on the year that was and what next year could be.

I normally travel south down the Island visiting various people and places along the way. However this time I have headed west to a small alpine village called Hanmer Springs. I came here six years ago through the Outdoor Education papers at Teachers College, where we walked the tracks, had a shower under a waterfall and had to plan and run a full day Outdoor Education programme with students from around the area. This has turned out to be an interesting experience coming back.

I booked my accommodation online, and should have realized something was wrong when I didn’t get a confirmation email from them, however being the time of year I though, oh they are just busy. I should have rang. I turned up to the top 10 mountainview holiday park expecting to have a tent site sorted, instead they wonder who I am and once they hear that I booked through the internet, they said “not another one, this is the fifth time its happened in the last couple of days, we haven’t been getting bookings from the internet, we need to get it sorted out” and me thinking, “its not my fault, do you have a tent site”. They had a tent site for one night and couldn’t fit me in for any more nights. So, its do I go back home, or find other accommodation. Right lets see what is round here. I find myself at the Hanmer Springs Forest Camp for four nights.

I have been and had a look around the camp and to be honest it hasn’t changed much. It has had new buildings which are cabins, however they were here last time. The old huts have had a paint job, and some more silver birch trees have been planted at the tent sites. It is good facilities and a large area to play, pity I don’t have a frisbee in the car, I wouldn’t be able to hit anything.

But why blog about this, I found a sign near the camp track which got me thinking. It explains that the camp track was built by Shirley High School Six form students in 1983 as a community project. (The camp track is a 1-2km walking track between the Forest Camp, which used to be a education centre and the Department of Conservation Information centre on the outskirts of Hanmer Springs in the historic forest) This has gotten me thinking about other school community based projects. In Christchurch there is a bridge built by Burnside High Students students at “The Groynes”. Where are these projects now. Will the new curriculum help get some of these projects off the ground again, or has the governments Resource Management Act, or the Health and Safety Act killed off these projects. The skills that these students learnt through these community based projects would have been, planning, design, building, evaluation and teamwork. Some of these are found in projects carried out at school. But to get students away from a school environment and out into the community is fantastic. In the following years those students would have gone back to the project and seen how it grew, changed, and is now used and would have said to their families, “I helped create that”. The amount of pleasure they must feel when they see it used now.

What other projects are there out in the community that schools help to create?

As I think about this, I start to see little educational projects, tree planting down a stream to show riparian planting and how it creates an environment that helps insect life and stream life improve, the worm farms that show students that they don’t have to throw everything away, recycling schemes that help the family at home with their green bin each week. Sustainability, is where this comes in, and environment. Litter campaigns to get the students to put it in the bin, this has been going for 18 years now and it still hasn’t hit through, and slip, slop, slap, put a hat on at school. But I guess my main point was where is the big projects that schools become involved in.

I find it difficult in my area of Technology ICT, can I say the same, probably due to the changing nature of ICT, in 1983 there wasn’t the internet, and computers were expensive and connecting them to each using ethernet. Not really, It is the hard materials that these type of projects get done, and with so many jobs in the education gazette crying out for technology teachers that this type of community project has probably been killed off, probably as well as the subject. Other groups that the seniors might get this type of project out of would the be environmental group at the school, or at out school the ki wanis,

As for me, tomorrow brings the Mountain Biking tracks of Hanmer, tracks like Dog Stream, Tank, and Detox. Then to take a load off in the thermal springs that Hanmer is famous for.

A hint: Purchase the Mountain Bike map from the local i-Site, the proceeds go towards maintaining and building new tracks in the Hanmer Springs area.

I also have been trying to find a wireless connection in Hanmer Springs to be able to check my email to see whether that a certain conformation email has come through. (It hasn’t) I have a copy of the Telecom Wireless Hotspots for New Zealand and there is one at the Heritage Hotel, however since I am not a resident of the hotel I have managed to find a location outside it on Jollies Pass Road, beside a walkway to gain access to the Telecom Wireless Hotspot. Pity that I was attacked by mozzies in the process of checking my email. I would have had a wireless connection at the top 10 mountain holiday park as they have wireless throughout the whole park. Oh Well, I am on Holiday.

Friday, 28 December 2007

Rise of the Videogame

Five part series by the Discovery Channel on The Rise of the Videogame

Level one:
The video game started not with a bang, but with a ping. Where did simple games like Pong and PacMan come from? And how did these global phenomenons usher in the videogame revolution?

Level two:
In the late '70s, early '80s, video games gained their face. Game creators became more liberated to create more complex video games and icons like Mario and Zelda began to give way to grittier characters. Learn how video game technology has evolved.

Level three:
Video games go 3-D, but the details they capture in the new virtual worlds are both awe-inspiring and disturbingly realistic. Critics begin to question if games are becoming too real, too violent, too addictive. Game designers begin wrestling with ethics.

Level four:
"God Games" begin simulating entire worlds and allow players to experiment with sometimes troubling cause and effect. Artificial intelligence creates lifelike characters and opens up opportunities for new learning tools and for artistic expression.

Level five:
Can a computer game make you cry? Games gain an emotional dimension, interpersonal connection, and Hollywood worthy story lines as they evolve and move onto the Web. What do these virtual world games tell us about the way we live in the 21st century?

Saturday, 15 December 2007

barcamp auckland

Standards are hard, presentation by mozilla (Robert O'Callahan)
webstandards and the problems that are faced by companies creating a broswer. 
Andy Clark, blogger fustrated by the standards committees.
Standards are necessary - if you put someone in complete control, to much power to a single entity. Probelms occur and someones own opinion it overruled.
Clean up existing standards - work going on to tidy up existing standards. defacto stanadrds and the dejuro standards.
CSS 2.1 spec still being worked on
W3C not interested, stopped work on the new standards, WhatWG, open standards group, clean up standards.
Add new features - otherwise things go pear shapped. OpenWeb, make a competitive platform. Video tag for HTML 5
Codifing stuff, 
Search google for HTML 5
Webforms2 extnsion to make html forms more usability.

 

Thursday, 13 December 2007

Moving Day

What a day it has been. Fare welling staff that have been at the school many years and have become friends. It is the same each year, staff get up, fare welled by the HOD through sometimes moving speeches and the tears of the staff leaving as they look back at their time at the school and the ups and downs that they have had. I think about when it will be my turn to get up and talk about my time at the school, what would I say?

Enough about that, my time to leave the school has not yet come.

Moving Day, it is almost a tradition at the school in the last week of term 4 changes happen, not the changes that you may think. This is the IT change, computers on the move, where unsuspecting year 9 and 10 students become pack mules to the rubbish skips and classroom hauling monitors, keyboards, mice, all the all important system unit to far flung places around the school. Who helps look after all this, the IT teachers, we become the Marshall's at the door telling students to stop, go, what to pick up and where it goes. You kind of feel like wearing a bright orange vest and having walkie talkies with you to make sure the puzzle is going together at the other end.
Yes there are the students that don't want to do it, and the others that "get lost" coming back from hauling computer parts around the school, but it is fun and the students geta buzz out of it because they are doing something different. They are not sitting in a classroom for the fifth time that day watching a video, they are being helpful.

I wish to thank the many students over the past 5 year I have been at the school that have helped move computer, open up the fresh batch of computers that come each year. Thank You.

Monday, 10 December 2007

Code Rules - Visual basic programming idea

I have been busy looking for ideas for my students next year, some new ways of introducing programming for visual basic. One of the websites I came across provided me with a full course that teaches the students programming through four teenagers and a trip across America.

It is called "Code Rules" http://www.academicresourcecenter.net/curriculum/pfv.aspx?ID=6667

Code Rules introduces students to basic computer programming concepts. The simulation involves four students who travel the country in a Winnebago stopping at offbeat places to face coding challenges. This is a complete introduction to a programming course using Visual Basic 2005 Express.

This set includes student curriculum that can be printed, as well as an "eBook" that can be burned to CD for each of your students. For instructors, there is an annotated version of the curriculum, projects and solutions with notes about teaching strategies, possible student questions, and points to emphasize.

Also included are PowerPoint slides to introduce the key concepts of each unit; exams, quizzes, and exercises; explanations and solutions sets for projects; additional projects; and a list of additional Web-based resources.

Designed to be used with VB 2005 Express in high schools it can also be used with Visual Studio 2005.

I hope to use this with my students next year.

This is from Microsoft

Code Rules! Visual Basic Programming Course
Category: Teaching Resources
Submitted Date: 08/06/2007

Code Rules is a course designed to introduce high school students, with little or no background in computers or computer programming, to the basic concepts of computer programming. The course teaches students to create fun and engaging applications using Visual Basic.Net. Through the course students are introduced to the basic concepts of programming, such as writing pseudo code, creating forms, defining and declaring variables and more. Code Rules has been designed to allow students to explore the world of programming, practice creating code and develop a better sense of what it means to be a computer programmer.

Within the course, students are cast as contestants in a new game show called "Code Rules." The game involves four young contestants who travel the country in a Winnebago stopping at offbeat places to face coding challenges which must be mastered before they can move to the next segment. As the students travel from place to place, their traveling companions, Jen, Kirk, Nikki and Cliff will teach them the programming skills needed to face the next coding challenge. At the end of each segment of the trip they will face a variety of engaging, real-life challenges to demonstrate their newly acquired programming skills. These projects will be items useful to students as they travel such as developing an interactive travel journal, a simple form to track mileage and gas consumption, etc.

This curriculum is available in the Academic Resource Center.

Saturday, 8 December 2007

Distraction: Desktop Defence

99% of flash games are rubbish, but once in blue moon you come across a flash game. Desktop Tower Defence 1.5 is such a game, deceptive in it’s simplicity, fiendish in it’s hidden complexity. Admit it, you made a spreadsheet to calculate just which tower/upgrade combination was the best value for money or what path provided the most area of coverage versus length. I even attempted to integrate the damage per second inflicted per square per path to figure where those precious points were best spent - all in an effort to prevent some blobs moving from once side of the screen to the other…

Honourable mentions go to Scrabulous - the scrabble knock off that made grandma’s game cool again - and all the great abandonware out there.

Play Desktop Tower Defence »

http://deft.co.nz/ source

Tuesday, 27 November 2007

more to hacker high school

Hacker High School - Security Awareness for Students

A link to the Hacker High School web site went to the AP CS list the other day. It is an interesting site with lessons and exercises about computer and network security. It appears to be designed to be used in either a classroom or a computer club or other after school program.

Some students today know a lot about network and computer security. Some of them use that knowledge for good and others, well, perhaps not good is a better way to put it than bad. Students are curious and they are going to try to find out what they can do and where they can get in. The other students, the ones who don't know as much, probably need a good education in security if only to protect themselves from their peers. And of course there are hackers out there who have clearly ill intentions and we need to protect people from them as well.

This Hacker High School page looks like a site that teachers and parents should know about. If nothing else you really don't want to be in a situation where the students in your life know more about security than the adults in their life.

Wednesday, 21 November 2007

Where am I today

well at the moment I am on Auckland's Queen street drinking at Starbucks and using the wi-fi access. I like my Grande Flat White.

But enough of the coffee talk, the reason why I am here and not at school today is Auckland University of Technology (AUT) is running an IT Symposium. This is the third year that it is running, kind of wish I would find this things out sooner, only problem is that the mail for this type of thing goes to one person who doesn't like to share. Just a side note: Give the person in charge of relief two weeks notice, not two days :)

I hope that I can keep this blog up-to-date throughout the entire day, I know that they have wireless at AUT, just need a login account.

Well now that I update this blog at 9pm at night you can take the fact that I was unable to get access to the wireless network. Which is a pity as now I have had to take notes on paper and enter them on here at another time.

The first speaker was Kathy Gordon talking about the future directions of AUT.
bringing together design
curriculum, students
new degree - bachelor of creative technologies (launch party tonight)
infrastructure
application
knowledge
looking at high achieving all rounders
"A BA for the modern world"
risk, experiment, evolve, adapt
looking at 40 students to start the degree in 2008
based around a studio environment

Next was a speaker that looked at the perspectives from UK - ICT education in schools.
Looked at the real issues
the drop in the number of students entering IT courses

Gender imbalance
public image - stereotype of geeks/nerds/social interaction problems
- I like this quote "computer science is the queen of the sciences"
- study computing for problem solving, intellectual, complex problems...

Now he kept posing questions that we could not answer as he kept going. SO I have a number of issues that I want to write down so I don't forget. 

Some of the real issues?
-too many courses (too varied)
-the dot.com bust
-not seen as cool by the students
-too much change?
-why do a degree when you can learn on the job?
-ICT/Curriculum/Achievement Standards problems
-1996 to get a job you have to have tertiary education
-knowledge based economy
-schools view of computing - dumping ground
-mentioned that computing was seen as the same as law, psychology in 1980's
-applied mathematics before computing came around(new subject) maybe needs to be defined more
-many home have computers, so we need tertiary study yo be able to use it?
- 80% of the people at the IT Symposium do not have Computer Science degrees.

Some more of the session
Computing has only just started
It has evolved , there is still more to come.
deal with the real problems
computer technology is here to stay, but can we use this technology to help out the problems in the world, health, third world water, cancer, global warming
no professional body to get certification in NZ

Monday, 19 November 2007

Mountain Biking

I have been asked to write an introduction for the school sports page for Mountain Biking, I will use this blog entry as a place to write a refine the entry.

Mountain biking is a popular sport for the individual?

Helping U19's earn respect. the term Huckster means someone who hucks, which means jumping off any little rock, or down a bank and loving it.

We are actually a group of students who formed a group to try and gain some respect and action for riders who are at high school.

Main Objective is to have some fun, so we encourage discussion, problem solving and participation at all levels, while on two wheels.


Bullying

As part of the 2006 ERO report into the school, an anonymous survey is to be given out to students to determine their views on bulling.

It was given out to three year 9 classes and 3 year 10 classes. Results were then tallied up and presented in  document that has been given out to staff, available to parents through the school library and also available to students through the library as well. I was skeptical about the report on first look, but now that I have looked over it and started to look at some of the comments from the students it is quite interesting.

In order to reduce bullying it is important to know the extent and severity of the problem, One way to do this is through a survey of those most likely to be victims of bullying at secondary school - Year 9 and 10 students.

Is the school a place that you like to come to and enjoy yourself when you are here?
There is a significant number of students happy and enjoying themselves at secondary school. It is to be expected that the largest number of responses is in the 'sometimes' category. Students like staff, have their good days and bad days and the challenge is to increase the number of 'Always' students.

Have you ever been bullied at school?
At the school, we have a 'zero tolerance' to bullying, the results do show that a 1/3 of students have had some form of bullying during there time at secondary school. This is a disappointing result as any bullying is unacceptable. A positive picture could be painted by the figure of 2/3 of students who said they have never been bullied at our school. However 1/3 of students in years 9 and 10 who completed the survey have experienced some form of school bullying at secondary school.

What kind of bullying have you experienced at secondary school?
Verbal bullying is the most significant for both years 9 and 10 with this type of bullying forming the top five responses. With the advent of new technology it is interesting to see that text bullying is happening through nasty/threatening texts. Others that are a cause for concern are year 9 students are forced to do something as well as asked to give up money or goods. these could also be happening from older students and that the year 9 are new to secondary school and that older students may see them as easy targets.

Where did the bullying happen?
Most responses detailed that the bullying was happening 'in class'. This is a concern as this is a place where there is a teacher supervising and so students should be 'safe'. There is also a significant amount of bullying between classes/outside classrooms and in the playground. this is when the bullying will often happen as it is often 'lost' or 'disguised' with the number and rapid movement of so many students.

Who did you tell that you are being bullied?
The responses made to this question are similar to published research. Students are often unwilling to report bullying - the second highest response, and they will often confide in a friend for support and advice about the problem. Speaking to a teacher is often very difficult for teenagers and so they will also try to minimize the issue by downplaying it. 
It is surprising that no student indicated that they had spoken to a student leader. These year 13 students are closer to their age that a teacher, visible around the school and would be considered by many junior students as 'sympathetic' towards someone being bullied.

My own comment on this: at intervals and lunchtimes the year 13 students are often off site down at the dairy or away getting some food as the canteen does not supply the food that they want. Many of these students walk out the gate at the beginning of lunch and make there way back before the school bell rings at the end of lunch. I think that the school needs to look at this. Also many students who have study often leave the school grounds as well. When are the year student leaders actually at the school for juniors to talk to them?

If you have been bullied and you told someone? What did they do and was it helpful?
The support received by a bullying victim is very important and the responses show that while many feel alone and overwhelmed by the bully, they have some empathetic support. Often the right message is being given - tell a teacher, or dean, but often the victim is reluctant to do this.

If you have been bullied and you told someone, what would you have liked them to have done differently?
The idea of support is seen again with some wanting the bully to be 'warned off' or 'talked to'. They needed the help of others to challenge the bully to make them stop. The feeling of the victim 'being alone' to face the bully is strong along with the idea of payback with 'punishing', 'suspending' and hurting the bully for what they have done.

Have you ever been away from school because of bullying?
Some explainations were given for this;
[They] are still bullying us and could still be angry.
Because no one in my class would talk to me or be my freind or sit with me.
Because I got mocked nearly all the time.
I said I was sick and didn't want to face her.
The might smash me after school while I'm walking home.
Because I was sick of the talk and the mocking.
I didn't want to get hurt.
I didn't want to get bullied anymore.
I was getting fed up with the situation and I had family problems to deal with.
Because I didn't want to face the people that were bullying me.
I though that it would stop the bullying.
 
The explanations are very telling and it is easy to see the pain and sadness these students felt.

asttle

we use a product at school to test and record student literacy marks, the product is called asttle. When it works it does a great job, when it doesn't you have to come up with some creative thinking to be able to get it running properly again. Today was one of those days.

Thre are two versions of asttle, one that is pre-installed on a laptop, that is the single user, and the other which is a network version, the multi-user. the majority of laptops in the english and maths department use the multi-user. The teacher has been using for a number of years and when she got her new laptop didn't think to have it changed over to the multi-user. Now all of the year 9 and 10 english exams have been setup from her laptop on teh single user account. Imagine when it came to putting these results in by the teachers, they could not find the test, the other option was to redo the entire year 9 and 10 english exam. No way.

So one thing about asttle is that it always, and I mean always backs up. Everytime you do something in it, it backs up. 
So we had a backup, we just needed another machine with single user on it to restore the backup and export the test to be able to import it on the multiuser program. 
c:\Program Files\asttle\asttledata <- copy this directory and paste it into a network area to be able to be copied to the single user machine. Then open and restore backup, next export the tests to a .ast file and open up the multi user admin mode. Then under the advanced options import the .ast file.
 
So in under 15 minutes the problem was fixed and the teachers are happy they don't need to see the exam supervisior to get 800 papers re-photocopied or retested.

Why don't we have access to e-asttle now? This may have solved half this problem, but does e-asttle have the facility of the current asttle system in being able to print off a test and the teachers input the results into e-asttle?

Sunday, 18 November 2007

Mountain Biking 2008

Since I have enjoyed the mountain biking this year, it looks like I could be taking it again next year. So far this year I have cracked a couple of ribs, I have a 2 inch gash on my arm and fractures my right shoulder. What a fun season it was. I found it great fun with the students who probably would never get the huge opportunity of every 2nd week to go out and do a sport that they enjoy. I think I have to get into it a little bit sooner next year to get some of them into racing mode for nationals in April.

http://www.collegesport.co.nz/sports/mountain_biking.html

So far the dates for the Auckland Winter Series are: AKSS WINTER SERIES:
Round 1: Sunday 6 May Riverhead forest
Entries close: 14 May
Round 2: Sunday 10 June Woodhill Forest
Entries close: 11 June
Round 3: Sunday 5 August Hunua Forest
Entries close: 30 July
Round 4: Sunday 2 September Whitford Forest
Entries close: 13 August

The new bike I am getting from Cycle City is a Avanti Hammer

Saturday, 10 November 2007

The new versus the old

This appeared in the nzherald describing the new versus the old curriculum.

I wonder how relevant it will be in the next couple of years when it has changed.

Friday, 9 November 2007

House websites

I have been running the house websites for a year as a proof of concept on how important they are to promote the house spirit within our school. They are used to inform students of upcoming events, sports rules, who won what, and how the points are going for the year. Many students have come up and said they have enjoyed jumping online after an event and seeing how wining or losing an event has had on the points.

One of the things has been having the time to develop these sites. Looking after four very individual sites has been a busy task. I did not use any Content Management System or online system either. All was developed and designed in Macromedia Dreamweaver, Macromedia Fireworks and Macromedia Flash (for those .flv files we all love)

Next year the house leaders will be looking after the content for there own houses. This poses a few technical problems, access to the web server, access in general, how can they post information online simply enough without having to know CSS or HTML.

I have looked at changing one of my five servers over to windows XP and installing WAMP on it as demonstrated at the TUANZ conference this year, built into it apache, mySQL, PHP, all up to date and integrated fine. For the house websites they will be running wordpress with customised themes for each house. This allows for house captains and leaders to put up there own content through online forms as well as I will look at putting gallery plugins on so they can upload photos to make things more interesting for the students.

I have now started on getting these up and running, and one of the problems I am now faced with is actually trying to find themes that are good. There are many themes out there but most of them are too simplistic, to be able to keep students attention, they have to be graphical and have colour. We are trying to promote house participation and house spirit, not "the monkey made me do it".

Tuesday, 6 November 2007

Technology and Key Competencies

The Relationship between Technology and the Key Competencies

Technology, as an essential learning area, has a responsibility to work with all other learning areas, to ensure the key competencies are mediated into the classroom curriculum. The capabilities captured in the identified five competencies are all essential underpinning capabilities for the development of a technological literacy that is broad, deep and critical, in nature, and one that will result in increasing student empowerment for future citizenship.

Key competencies cannot be developed or evidenced outside of a context. Technology provides a range of diverse contexts, where students can develop their capability with regards to these five foci as well as use these capabilities to support their learning in Technology. In this way, technology-specific learning intentions and the competencies become integrated within the learning environment.

All aspects of Technology education would support and be supported by an increase in sophistication across the key competencies. Examples of how the key competencies are embedded within technology learning experiences are discussed below.


Relationship: Thinking


Critical and creative thinking are essential in Technology education, as is the development of a high level of awareness of the nature of thinking underpinning any decisions. Being able to step back from a situation and answer questions such as ‘what is happening?’, ‘why is it happening?’, ‘should it be happening?’ and ‘how could it be done differently?’ rely on sophisticated thinking skills.

These thinking skills are required across all three strands of technology education. Such thinking is essential for making informed decisions that are based on ethical, as well as functional grounds, allowing for an understanding of fitness for purpose, as well as explorations of the fitness of any stated purpose. For example, opportunities for the enhancement of such thinking are clearly identifiable when:
  • undertaking technological practice within innovative problem solving situations;
  • understanding the nature of technology through exploring examples of existing technological outcomes or developments, debating contentious issues, or projecting into alternative scenarios; and
  • developing key technological knowledge that is then used to evaluate within technological modelling, or to explain how and why products and/or systems work.
Relationship: Using Language, Symbols, and Texts

The specialised language of technology provides significant opportunities for enhancing students’ competency in using language, symbols and texts. This will be reinforced through informed technological practice where critical evaluation, as part of ongoing experimentation, analysis, testing and final evaluative judgement, requires students to understand specialised language, symbols and texts. They will also need to use such language to explain and justify their thinking across a diverse range of contexts.

Because Technology draws knowledge and skills from across a range of learning areas, and additional disciplines, it allows students to appreciate how and why language, symbols, and texts differ across disciplines and contexts, and why what is thought of as accepted knowledge and skills, also differs across disciplines and contexts. Understanding these differences supports students in their ability to interpret and use language, symbols and texts in appropriate and informed ways in their own lives.

Relationship: Managing Self

When undertaking their own technological practice, whether individually or as part of a group, students are required to develop self management skills in order to effectively plan ahead and manage resources efficiently. The ability to understand and undertake technological practice that takes account of wider social and physical environmental factors allows students to develop a strong sense of self, and recognise how they can manage themselves within and across a range of life situations inside and outside of formal education communities.

Relationship: Relating to Others and Participating and Contributing

Technology programmes provide opportunities to develop ongoing and mutually beneficial community relationships critical for developing student competency in relating to others and participating and contributing. Because of the inclusion of a range of knowledge and skill bases in Technology, both technological and those from other disciplines, it is common practice in Technology education to draw expertise from the community and/or industry. Inviting people in as valued experts provides a meaningful opportunity for the development of relationships with a range of people from local and extended communities. Students also often work alongside service organisations, local businesses and other community groups to meet an identified school or community need. This type of working relationship allows all parties the opportunity to develop a better understanding of the ethics, beliefs and understandings of respective groups and individuals, and thus enhance future interactions.

All technological practice and resulting outcomes are situated in specific social and physical environments, resulting in both opportunities and constraints. Conflicts and the need for collaboration are common factors that students in technology have to deal with. In turn, students become empowered to operate across a wide range of social groups. This is key to increasingly sophisticated technological practice, and the development of a broad and critical understandings of technology’s role in contemporary society.

copied from http://www.techlink.org.nz/curriculum-support/tech-key/page2.htm

programming ideas

http://www.thornhill.ss.yrdsb.edu.on.ca/Departments/Computer%20Science/ICE4M/ICE4M.shtml

Game programming links
http://www.schoolgamemaker.rupert.id.au/links.htm

Monday, 5 November 2007

The New Zealand Curriculum Online – launching 6 November 2007

The New Zealand Curriculum Online will be launched on 6 November 2007

can't wait, are they going to annouce how it is going to be implemented in schools. Teacher only days to get it going and schemes changed. Or is it just going to be the big stuff.

Saturday, 3 November 2007

Subnetting a network

One of the things that I have trouble with when setting up networks is the subnetting part. On digg.com today they an article that talks about how to setup a subnet for schools. This could be interesting part to talk about when doing the networking unit at school or the hacker high school.

http://www.learn-networking.com/design-basics/how-to-subnet-a-network.php

Denial of service attacks and how to prevent them
http://www.learn-networking.com/network-security/how-to-prevent-denial-of-service-attacks.php

Now one of the things I like about the learn-networking is that they have is a quiz at the end of each.

Monday, 29 October 2007

Thinking Skills

As we look at the new curriculum some learning needs to be involved, that is what this blog has been all about:

As I look around the internet a website fostered my interest www.learnerblogs.org

One site has a number of thinking tools
http://www.intel.com/education/tools/index.htm?iid=teach+tools
"With the help of technology, teachers will be leaders in the transformation of education around the world." – Craig R. Barrett – Chairman, Intel Corporation

Free tools and resources for educators support collaborative student-centered learning. Online thinking tools are active learning places where students engage in robust discussions, pursue investigations, analyze complex information, and solve problems.

Key Stage 4 handbook for teachers
http://www.standards.dfes.gov.uk/secondary/keystage3/downloads/ws_lil_sup_ks4_hbk.pdf
Key Stage 4 school training manual
http://www.standards.dfes.gov.uk/secondary/keystage3/downloads/ws_lil_sup.pdf
Leading in Learning: developing thinking skills at Key Stage 3
http://www.standards.dfes.gov.uk/secondary/keystage3/downloads/ws_lil_ts_exemp006105re.pdf
Also found a video on Thinking Skills
http://www.teachers.tv/video/3473

one of the other things found is netsafe information, although it doesn't go with this title it could help with the US 2781
http://www.e-learning-computing.com/netsafe/page_01.htm
I am now thinking of get a del. account :(

Sunday, 28 October 2007

New Curriculum

By the end of this week, New Zealand Schools will have a new curriculum that will be released by the New Zealand government that is to be taught in all schools by 2009. I look forward to seeing how the key competencies have been written and how the technology curriculum has been presented. Also I wonder what aspects of ICT have been included.  

Wednesday, 24 October 2007

k12online conference - classroom 2.0

I am watching a keynote for classroom 2.0. this relates to how teachers teach. It is not about the tools it is about the pedagogy, look at our teaching and how we teach.

Collaboration, the idea is about learning

Information is vital,we are not rote learning anymore, we need to promote information,
The relationship between the kids in the classroom, they need to see themselves as legimate creators of information, who are questionnaires of information, see if things are real, truth from fiction, bias, viewpoint...
to be a good citizen, a good thinker, no matter where you live..

Curriculum, we have a mandated curriculum, our relationship to the curriculum and what is in the curriculum, looking at the curriculum constantly and trying to decide what is important, what do they students need.

This is the first part of the video.

Tools in the classroom, blogging, RSS feeds, talk about information, collection of information, flickr, podcasting, voice threads, its about the tools. Classroom concerned with information, relationships, local and international. Internet based tools, These are free for teachers, students, they are what is helping to make learning interesting for students.

Relationships, factors, change in a classroom, change in power... they change the relationships between people. Changes the relationship between students and information.

Internet safety is important.
Tone set from the beginning of the year.

Change in classrooms
attitude, changing attitude towards classrooms and education. Not just us, but society, they have an idea on what classrooms should look like, and what happens, 20 years out of date.

redefining what happens in the classrooms.
thinking of classrooms as studios - lots of different things going on, some extra noise, could happen late at night. Vibrant spaces, lots of energy, both from the students and the teachers. A master, who is in charge of the space, not a typical teacher

Every classroom should be a global communications centre.
Learning is something we do together.

Will Richardson's blog... teaching today is a collective effort not an individual accomplishment, learning to is a collective effort not an individual accomplishment.

Why technology assessments suck, they focus on the skills, its about connections, learn from each other and see new things.
Education informatics....
We need a way to track kids activities in classes, what blogs they keep going back to?
Adjust our practices in our classrooms.


Cybersafety, curriculum matrix released

Netsafe have released a matrix of what they would like to develop as an education curriculum to help educate students on the the safety of the internet.

It does however appear that netsafe website is unavailable at 11:20pm
however through google and the use of the View as HTML I can copy and write

Attached is a draft release of the NetSafe Cyber Citizenship Education Matrix. The purpose of this document will be to provide teachers and schools with a framework for developing good cybercitizens. It is intended that the document will be referred to when planning for the integration of cybersafety into school curriculum delivery.

A good cybercitizen is a person who uses ICT confidently, safely and responsibly to participate and collaborate online.

As NetSafe publishes our own cybersafety learning material, or becomes aware of other cybersafety material available, we plan to provide advice as to how such resources could be used to promote the competencies outlined in the Cyber citizenship Matrix.

The Matrix is a fairly high level document and at first glance may not seem to provide too much specific advice on the skills required by modern cybercitizens. This is intentional as the document is intended to allow cybersafety education to be integrated throughout the official New Zealand Curriculum, while also allowing educators scope to focus on particular areas of interest or relevance. It is also necessary to future proof the framework as much as practicable and not therefore become bogged down with specific technologies. As the technologies and the issues that cybercitizens face come and go, schools and educators will be able to flesh out the matrix with more specific and relevant learning objectives.

The layout of the document will be recognisable to anyone who is familiar with New Zealand curriculum statements. Down the left are the three ‘Attributes’ (or strands) as referred to in the definition of a good cybercitizen. Across the top are a sequence of year levels beginning with early childhood education, and moving through to year 13.

Unlike the New Zealand Curriculum which is arranged in levels and recognises that students in the same class may be performing at different levels, the cyber citizenship matrix is divided into distinct year bands. This is because the matrix is intended as much to provide a framework for linking in cybersafety learning materials from around the country and around the globe, as it is to provide a suggested learning progression.

Once complete, the document will be published on the NetSafe website.

NetSafe would like your feedback on any aspect of the NetSafe Cyber citizenship Education Matrix (including the title). Some suggested areas you might like to comment on may include:
• The attributes
• The breakdown of the bands
• The progression within each attribute in terms of developmental appropriateness
• How the language could or should help link through to the key competencies as outlined in the New Zealand Curriculum
• The overall complexity or simplicity of the document
• The practicality of providing such a framework
• The perceived usefulness for educators…

Ideally I would like to gather all feedback by 31 October

I thank you in advance for any time at all you may be able to spend providing feedback. Your feedback is valuable. Please email it to: richardb@netsafe.org.nz

There are three sections
Confident - Understand the impacts and potential of use for individuals and society.
Safe - Apply sound cybersafety strategies which promote personal safety
Responsible - Understand, follow and promote cybersafety guidelines which support community safety and wellbeing

There are two sections for secondary schools, Year 9-10 and 11-13, these will have some comment on tomorrow after I get some sleep and my laptop's battery gets charged.

Right to carry on,

Year 9-10
Confident - Investigate and compare how cyber-technologies are used by individuals, groups or organisation to achieve various objectives both positive and negative.
Safe - Display appropriate methods of dealing with specific cybersafety incidents, and explain how the risk of such incidents occurring could be minimised.
Responsible - Contribute to the formation, review or promotion of cybersafety guidelines for a community.

Year 11-13
Confident - In the context of cybersafety, analyse and critically evaluate the impact of cyber technologies on themselves and society both in the present day and historically.
Safe - Is able to proactively identify and appropriately respond to a range of potentially risky incidents when using cyber-technologies.
Responsible - Demonstrate a commitment to interacting within the online environment in an ethical and socially responsible manner.

These have a great amount of interest to me, as we are using more and more web technologies in the classroom, however, it is how they are being used outside the classroom. The way they are being used at home by various students to inflict pain and hummilation on some students, and the other adage of one you put it up it will never disappear. Students and parents have never had to deal with these forms of electronic bullying and problems before. A photo you could tear up, paper could be burnt. But once you put something online, it will be there forever.

my response
having a look at the draft matrix I like the idea of it. Though there are some things I would like to comment on.

The attributes, I agree with safe and responsible, though I feel confident isn't the right word when it comes to understand the impacts and potential of ict use for individuals and society.

The breakdown of the bands, these are clearly defined at the lower levels, however I feel there does need to be a change at the senior end 9-10 and 11-13, I would probably look more at 9-11 and 12-13. the reason for this is 9-11 are still grasping with the ICT and internet use. 12-13 would be able to have the life skills and the reasoning to be able to pro actively identify and appropriately respond to a range of potential risky incidents when they are using cyber-technoloiges, as well as being able to demonstrate a commitment to interacting within the online environment in an ethical and responsible manner, I know at our school we make more use of the LMS and other web 2.0 technologies at years 12-13 and this would be a way to be able to monitor them against the attributes.

I would like to see more details or achievement objectives before I comment on the key competencies, or at least wait till after the new curriculum has been announced and have some time to digest it.

It is a overally simple document that will help with early childhood and primary education, though I think it needs some more complexity when it comes to the secondary schools. more details may help with this.

I look forward to providing this framework to my year 9 and 10 students. As well as looking at the challenges I could pose to my year 12-13 students. I don't think I have the space to be able to fit it into my year 11 scheme though. The Health subject in the school may be able to focus on this, health will be able to catch those students that miss the ICT modules throughout years 9-10 and help the students to meet the bands. Although some development may need to be associated with this for those non-ICT teachers. I also am interested in educating the students through the netsafe network use agreement that we are busily trying to get together for the start of next year as we make more use of web 2.0 technologies and mobile devices as well as research in the classroom.

This will be able to help all teachers met the set of guidelines to help our students with internet access and to be able to educate parents and caregivers on the use of ICT and the internet through schools. This has already started through the use of hectors world in the primary schools and has been missing in the secondary schools where teachers are making more and more use of ICT without knowing what students are accessing. I remember a couple of years ago when students asked if they could access bebo in class time, and now dealing with the issues that bebo has throughout the school. Students are great adapters of ICT and teachers need to be able deal with those issues in a more confident and collaborative manner. this document may be able to help get some Professional Development to educate teachers about how to use the internet in a collaborative and safe manner.

I look forward to seeing the next stage of this matrix and I believe it has been a long time coming, I remember going to a netsafe meeting a couple of years ago where this question was asked. Since then I have been wondering how it was going to be incorporated into a already fill curriculum.

response back
Thank you for your honest and detailed feedback regarding the cybercitizenship matrix. Your comments will be most helpful as we develop his document further. I appreciate the pressure on your time, especially at this stage of the year.

To briefly respond to a couple of your comments:

The term 'confident' comes from the government's digital strategy. Within the strategy, the NetSafe programme is designated a major contributor to the confidence strand. At NetSafe we think of cybersafety as a learning enabler - giving individuals confidence to realise the benefits ICT can bring. I have tried to incorporate this into the 'attributes'. Perhaps it is more about awareness than understanding of the impacts of the use of ICT?

We could provide more detail in the upper year levels. In fact in the original document there were two further 'stands. I am also hoping that the detail will actually come as the matrix is populated by example lessons and resources either from NetSafe, overseas, or teachers themselves. We are still developing this process.

Thanks again for your input.

House Name Change

More grief over the name changes today, the reason for this is that they have been released to staff. Anything that is released to staff is almost instantly said to students by form teachers.
The feedback from the staff is that the Pohutakawa House name is too long, why are there two K's (Kauri and Kowhai) and that if we are to continue to use the Red, Green, Gold, and Blue that the name change is just a farce.

It needs some more thinking.

If we are to use the trees as the identify of the houses then we need need to change the systems in the school to the new system. Instead of R10, G10, B10, and O10, it gets changes to R10, P10, K10 and T10. the T could be changed to Totara House instead of Kauri House.
Identity of the houses and providing values to the students was what pushed the changes in the first place, it has been killed with the current solution.

Monday, 22 October 2007

Hacker High School Movies

Facts behind screen hacks
http://news.bbc.co.uk/2/hi/programmes/click_online/7029540.stm

We see a lot of impressive hacking in the movies, not just taking over individual PCs but whole traffic systems and top security databases.

Waterloo Station formed the back drop for The Bourne Ultimatum, one of the biggest movies of the year, in which Americans take over all of the CCTV cameras. But just how realistic is that scenario and worse, what about a hostile takeover?

According to Sarb Sembhi, IT systems analyst at ISACA, local authorities and the police use network TV because they can take advantage of the technology that allows them to view cameras on any system.

"Unfortunately not only does it enable them to view any camera on their system from anywhere, it also means that other people who shouldn't have access to the system may end up having access to the system.

"Anyone can do this if they know what they're doing," he said. "It may not be friendly governments, it could be any government anywhere, it could be criminals, it could be terrorists, they can use the system for their own advantage."

Paul Docherty of Portcullis Security is paid by governments and blue-chip companies to hack into their systems. He has been doing it for 20 years and believes hijacking Waterloo's cameras would be a difficult feat

"The Waterloo scenario is a wired system, whereby they're wired back to a central control station. You would need access to the control station in order to gain access to the data.

"In a wireless network the camera has to broadcast whatever it's picking up across a wide area in order for it to be picked up by another system and then relayed to whoever is looking at the data. In those instances anyone can sit nearby and intercept the data.

"Potentially they could inject [data] packets in that so they could control the camera and point it in the direction they wanted it to go."

'Drastic attacks'

What about our critical infrastructure. Could undercover hackers take down a power plant or bring transport to a standstill?

An Associated Press report was posted on the internet last month showing an internal test by Homeland Security in the US to see if hackers could tap into the power network and shut down a turbine. The test succeeded.

"If you know something about SCADA technologies you can introduce yourself inside the network of power plants, nuclear plants, pipelines, hospitals, traffic lights in the city, airports and so on," said security evangelist Alessio Pennasilico. "Once you are inside the network you can do whatever you want."

SCADA is an older system that is still very common today. It allows you to acquire data from multiple systems.

Mr Docherty said: "In terms of how realistic the attacks are, personally I think it's somewhat over dramatised, the stuff of James Bond movies.

"However, what we're seeing is a convergence of technologies, and many SCADA systems are now connected to other systems which are connected to the internet via the IP protocol.

"So potentially the theory of the attacks is true. I think the realism of them is not so true. Someone would very much have to understand many, many proprietary systems in order to make such drastic attacks happen."

Personal safety

Hackers can also target individual mobile phone users if they are using a Bluetooth headset or a handset with Bluetooth switched on.

Bluetooth headsets rely on the phone to transmit radio waves to the earpiece. But they are vulnerable. That two way connection can also be a gateway into your handset.

"If there is a specific flaw in the Bluetooth implementation in the model of the phone you won't even know that a hacker is getting into that specific phone," said Dino Covotsos of Telspace Systems.

"A lot of different techniques include bluesnarfing and bluebugging. You can actually do something called STP tooling."

STP tooling is a method for establishing the services that are supported by the phone.

Mr Docherty showed BBC Click how easy it was to pull off all the contacts from a phone placed 10 metres away from him. Using a laptop and a free computer program available on the internet it took him about a minute. The target's phone did not make a sound.

He could also have lifted calendar and diary entries and even have made a call without the phone owner's knowledge.

Fortunately, newer Bluetooth phones now warn the user.

Portcullis Security also hacked into the programme's wi-fi system in 10 minutes. It was "protected" by a 128-bit WEP encrypted password. Again the programme they used is free and it is available on the internet.

You still need a degree of expertise to pull off a movie-style spying attack but it does seem that wireless systems in particular, while convenient for us, have made the hackers' lives a little easier, and those spy scenarios just a little more realistic.

House name changes

This has been going on for a while now, and this week the new house names are announced at our school.

Blue House becomes Kauri House










Green House becomes Rimu House













Red House becomes Pohutakawa House









Gold House becomes Kowhai House









This will still cause some of the headaches for us in the ICT department, we have had problems with Green and Gold house because these are included in a students login, now we have the same with Kauri and Kowhai.

Why could one of these not have been named Totara!!!

Microsoft XNA: A Primer

Trying to find some more information on teacher microsoft XNA development to year 13 students. Using slashdot.org and the search term homebrew I came across this article

"Over at the education site Game Career Guide, they've got an in-depth primer of Microsoft's XNA, including interviews with Julie Ellen and Joe Nalewabau of Microsoft about the PC and Xbox 360 indie/student homebrew construction tool, as well as chats with two developers (Benjamin Nitschke and Alex Okafor) who have worked with XNA to some notable effect. Microsoft's Ellie claims of the efforts: 'Homebrew and independent developers are often very talented and have lots of creative ideas. Being able to officially write games directly for a retail console right at home is a first and could be very empowering for them. For the homebrew and indie scene to succeed we need to provide two things: great tools and access to a large audience. We're working on both.'"

Some of the sites that are listed are

XNATutorial.com also offers video tutorials - there's an amazingly comprehensive set there too, with everything from installation, right through to information on physics engines, and an immense number of topics in between.

XNADevelopment.com
hosts a number of interesting written tutorials on subjects like installation and how to find the first tutorial within the XNA download, as well as source code and instructions for developing a Tetris clone, and a simple controllable 2D sprite.

XNAResources.com also hosts a variety of tutorials, with a well put together series on map tile engine creation, plus they offer links to more advanced subjects like 3D engine solutions and stroke based text rendering.

Last, but certainly not least, is Xbox360Homebrew.com, which hosts tutorials, news, a gallery of user uploaded XNA titles, forums and developer blogs, and provides and excellent hub for the XNA community.

Sunday, 21 October 2007

Wizard Of Woz Keeps Casting His Spells

What would you do after founding a technology giant? Steve wozniak Uses those resources to keep innovating and following his creative impulses.

http://electronicdesign.com/Articles/Index.cfm?AD=1&ArticleID=17186

For many, "Vice President in charge of R&D" sounds like a good job - reputable, good pay, and maybe even exciting. But tack the words "at Apple Inc." to the end of that title, and you have, well, a whole different barrel of apples.

Steve Wozniak didn't earn this job with a good resume. He forged it, inventing the first single-circuit motherboard with embedded ROM in 1975. He and Steve Jobs had to sell their most valuable possessions to assemble a product line of Apple Is. Some people can't put a price on fame and fortune, but they can. About $1300 and a few IOUs later, they kinda made their money back.

Follow the Silicon Road

Wozniak didn't want to become an entrepreneur or take the world by storm. He was content with his job at Hewlett-Packard and even more content as a hobbyist. Wozniak worked at a bench from 1973 to 1976, optimizing designs for calculators other EEs developed.

"I wanted to be an engineer in a lab," says Wozniak. "The spirit of engineers was most important. I loved the engineers, loved the project, loved the company!" He spent his days at the plant and his nights batting around design ideas and inventions with the Homebrew Computer Club. "I'd be off in 'computer design world' and Steve [Jobs] would ask where it could go," he says.

This dynamic led to the sale of a wood-cased CPU comprising roughly 30 chips for $500 (then $666.66 after a markup) and the beginning of a revolution. "After Apple I, every computer used a keyboard," Wozniak says. "Before, they used geeky switches. It was a trading transition in history." The Apple I was a quantum leap in the available technology. Before Wozniak threw his hat into the ring, the Altair 8800 was the closest thing to a personal computer.

"You could turn it into a computer, but it was basically an Intel processor," Wozniak says. "A computer to me has to have the ability to program. Altair couldn't. You had to buy extra cards. I was well past that point. Sure, it used ones and zeros, but I wanted a real computer my whole life. I would've sold my house for a computer, but it had to run a program."

He created a motherboard and compatible components, but the product was more for a hobbyist or engineer than a consumer because users would have to add input sources, a keyboard, casing, and a display themselves. He wanted to bring it all together so anybody and everybody could operate an Apple right out of the box.

Playing Games

Born in 1950, he didn't have much technology available to him as a child, but he would stumble onto information about technology here and there. Picking up little scraps wherever he could, these bits of info would be like "little secrets" to him and his young mind - information he would keep that other people would flat-out ignore.

When he was 10, a book about a ham radio operator inspired him to not only earn a ham radio license, but build a transmitter and receiver by hand as well. He also conjured a game where he would experiment with adding and subtracting transistors to his gadgets. "It helped me very much. You sit down, think, plan, and make sure what you build is efficient. It's good practice for what engineering involves," he says.

Wozniak left HP in 1976 and formed Apple Computer with Jobs, asking himself how he could put these things in his head into the smallest number of chips. As a result, he would write his own Basic, even though he never programmed in Basic in his life. But that wasn't the only thing he would have to do on the fly. "Everything was created from scratch," he says. "Everything I did had to be made up for the first time."

Wozniak abandoned the wooden frame for plastic, added dynamic memory, had tape interfaces, and added color graphics and sound. "The Apple II connected everything. [It] was a 'Woz' from the ground up," Wozniak says. Users could also plug in cards to add floppy-disk or printer functions - or as Wozniak calls it, a true "plug-and-play" device.

Seeking Alternative Routes

Because of Wozniak's work with Apple, he had to bury other projects. You would think such a computing mind wouldn't drift toward other desires, but an urge to impart knowledge hibernated in his mind. After he left Apple in 1985, he formed his own company, CL-9 (Cloud 9). But after two years, he moved on from that to other endeavors, including teaching kindergarten.

"I wanted to be a teacher my whole life," he says. "Secretly, I wished it. I can't tell you how much fun it was when they learned something." Though he doesn't believe it would work for other people, discovering how much you can smile over how much you can frown is a lifestyle. "I was just doing what was fun for me," Wozniak says. "I would be doing this at home if there was no money."

He misses his time with the Homebrew Computer Club and Apple, though today you can find him playing polo on a Segway, working at Jazz Semiconductor, or off promoting his autobiography. "I miss the technical camaraderie," Wozniak says. "The whole feeling of being on a revolution, on the edge. I miss the intuitive philosophies."

Saturday, 20 October 2007

KnowledgeNET meeting

At a cluster meeting discussing many of the new features that will be coming out in January.

Review of how changes that the group came up with in previous meetings have been demonstrated and fine tuning asked for. I start to wonder why these changes don't come in sooner, and the answer is that they are still in "Alpha" or "Beta" stages and need to go out to "beta" schools.
Looking at SCORM compliance and how these could be incorported into KN. Looked at exelearning.org

A website was demonstrated during the break called www.scrapblog.com

Review of the Interoperability project, musac and knowledgenet were the joint SMS<->LMS operators chosen.
These have been mostly primary schools and one secondary school, so some features that should have been added for secondary schools haven't been yet.

Now this leads to a common problem, Professional Development. We are undertaking this at school with the KnowledgeNET product. Now if everything datview have said today the PD that we do this year will be out of date in January as knowledgeNET will be undergoing some major development changes, in the way it looks and by what it provides for teachers and students. Do we do the development now or hold off?

Wednesday, 17 October 2007

The Pohutukawa Tree

As I sit here waiting for the Year 12 Production of the Pohutukawa Tree I found myself looking up reviews of the play by Bruce Mason.

It is strange sitting here surfing the Internet before the play starts in the audience reading about what the play is about.

It is set in the small town of Te Parenga just after the Second World War. Aroha Mataira struggles to keep her family together in the face of new challenges and Johnny's alcoholism. The play shows the struggles of Maori people to keep their land and culture intact in the face of change and how actions in the past continue to have consequences for later generations.

Saturday, 13 October 2007

Reports

It has come to that time of year again, just seems like I just finished the last set of reports not so long ago. Senior Reports are due tuesday. Just as another online conference comes along. It seems to be deja-vu again. The last time this happened it was the time4online conference in New Zealand. As I watch the pre conference key note speaker in the k12onlineconference I look at the airport in the background of his video and think, maybe I need a holiday.

Tuesday, 9 October 2007

Hacker High School Movies

There were several scenes in The Italian Job (2003)
(http://www.imdb.com/title/tt0317740/) where Seth Green plays a hacker. The most memorable scene for me is where he hacks into the city's traffic control system to create traffic jams so that the thiefs have a clear get away path, and the cops can't get to them due to the backed up cars. This scene is closer to the end of the movie. I think Seth even mentions a popular exploit in order to get into the system.

My students and I were talking about this as they were trying to talk me into playing more movies for them.

Their favorite was Office Space (1999)
http://www.imdb.com/title/tt0151804/. There is a scene where they're planning to insert some code in the company's code that will take the fractions of a penny, and instead of rounding it off, it will take that fraction and deposit them into a secret account. The idea being that tens of thousands of transactions a day will add up very quickly. The funny part of this is where they're sitting around a kitchen table discussing the idea and trying to get the third person involved. At some point they say "This doesn't go anywhere beyond the three of us.", and you hear the neighbor from next door shout "Don't worry man, I won't tell anyone".

Finally, if you would like more accurate portrayal of how hackers are portrayed, there's the movie Freedom Downtime (http://www.imdb.com/title/tt0309614/), which is an excellent documentary.
Many interviews with and about hackers. I showed this movie to my class, and this is what got them attempting to talk me into showing more movies.

I'm sure there's many more, but I'll give others a chance. I would also be happy to assist with this project should there be need.

This may need some translation
* Terminator III: Rise of the Machines
(http://www.imdb.com/title/tt0181852/)
En la mitad de la pelcula aparece un virus incontrolable que parece infectar todos los servidores importantes en el mundo, sin ninguna atencin al tipo de servidor. Luego, el general a cargo de la construccin de Skynet "activa" a Skynet, para darse cuenta segundos despus que en realidad era la misma Skynet la que estaba simulando un virus a escala mundial (What?!?).

* El imperio contraataca
http://www.imdb.com/title/tt0080684/
R2D2 abriendo las puertas de la ciudad BESPIN, ahi, ademas de abrir las puertas, el computador de la ciudad le "cuenta" que han deshabilitado el hiperimpulsor.

* Juegos de guerra:
http://www.imdb.com/title/tt0086567/
al comienzo, cuando el protagonista entra al computador del colegio y cambia sus notas ...

Otra ... el protagonista busca la forma de entrar al computador que le ofrece juegos y encuentra que el nombre del hijo del creador de la maquina es Joshua ... que resulta ser un password back door

* Matrix III
http://www.imdb.com/title/tt0242653/
Triniti debe hackear un edificio y se conecta a una consola para hacer "ssh -l" a un terminal y luego utiliza nmap para hacer un port scanning

Otra ... caminar por los pasillos ocultos al operador que son las backdoors de las maquinas

* Star trek la Ira de Khan
http://www.imdb.com/title/tt0084726/
Kirk enva un codigo de deshabilitacin a la nave que habia raptado khan para hacerse del control remopoto (un backdoor)

* El da de la independencia
http://www.imdb.com/title/tt0116629/
Cuando insertan con un mac un virus en el sistema extraterrestre que lo inutiliza (aunque la pelicula es super debil en lo tecnico, esta escena es representativa).

* Mission Impossible
http://www.imdb.com/title/tt0117060/
dos escenas al entrar al cuartel de la CIA, activan las alarmas de incendio para violar la seguridad fisica del edificio. Se saltan las barreras de proteccin

Otra, cuando utilizan un bloqueador de seales de celulares.

Translation Spanish to English

In half of pelcula it appears an uncontrollable virus that it seems to infect all the important servants in world, without none atencin to the type of servant. Soon, general in charge of construccin of “active” Skynet a Skynet, to occur to account seconds despus that in reality was the same Skynet the one that was simulating virus on world-wide scale (What).

* The contraataca empire
http://www.imdb.com/title/tt0080684/
R2D2 opening the doors of city BESPIN, there, besides to open the doors, the computer of the city him “it tells” that they have deshabilitado the hyperimpeller.

* Games military:
http://www.imdb.com/title/tt0086567/
in the beginning, when the protagonist enters the computerof the school and she changes his notes…

Another one… the protagonist looks for the form to enter computer that offers games to him and finds that name of the son of the creator of the machine is Joshua… that back turns out to be password door

* Matrix III
http://www.imdb.com/title/tt0242653/
Triniti must hackear a building and it is connected to a console in order to do “ssh - l” to a terminal and soon uses nmap stops to do port scanning

Another one… to walk by the hidden corridors to the operator whom they are backdoors of the machines

* Star trek the Wrath of Khan
http://www.imdb.com/title/tt0084726/
Kirk enva a code of deshabilitacin to the ship that habia raptado they khan to become of the control remopoto (backdoor)

* It gives of independence
http://www.imdb.com/title/tt0116629/
When they insert with mac a virus in the system extraterrestrial that makes unusable it (although the film is super weak in the technician, this scene is representative).

* Mission Impossible
http://www.imdb.com/title/tt0117060/
two scenes when entering the quarter of the company, activate fire alarms to violate the physical security of building. The barriers of proteccin skip

Another one, when they use a blocking one of seales of cellular.

Monday, 8 October 2007

Problems with the network

We have been having issues with our school network, and today the problems surfaced so they were right in the face.

We use a managed network solution and it runs pretty much excellent however we have been having issues since the 18th September. that is when I emailed through one of the problems.
Not being able to access learning resources, this comes with a 507 null exception error.

We had a number of updates carried out throughout the holidays, IE7 and Adobe acrobat 8 and DST update. Now some students have managed to login without any problems, other have had a box that appears saying setting up personalized settings, and after setting up IE7 setting it just hangs. Now we have been waiting for the IT department to solve this issue and a number of classes have had to do very little until this issue is solved. At 2pm I got sick of this and worked through a solution that gets teh account working, not to sure how much it stuffs up the system however, but hey, they are able to get in and work.

When it hangs... User press CTRL + ALT + DEL

User selects Logoff. This will then cause a error in the personalized settings dialog box and make it crash.

Then the user logs in and the personalized setting are applied again, this time working.

Now this works and has been emailed through... I really do hate showing up the IT department but it has to done sometimes.

Now one of the issues that the IT came back with is that the programs are now not appearing in the Start Menu, hello, we stated this back on the 18th September. Someone has managed to break the management console and it probably needs a damn good health check to fix it. Am awaiting this to see if it works, I asked for this back on the 18th September...

His solution is a windows profile fix, however we are on a managed network!!! This is what I am getting annoyed with, the management console will do most of the repairs, send him on some training for the managed network.

Contents of email.
Bug Report Program sets are not loading up on computers Microsoft Office has not been appearing for a while now, Now I have the Programming set not appearing

Also we have a Tui Ad competition at the moment. He has it running, yeah right. This realates to some CD Software we have within the school. The department has been waiting for months for this software to be installed and running, every time we see the IT technician, he says, yes I have it running. But we have to prove to him that it doesn't run. I got in contact with eth makers of the program and they say that they will send out the network capable version of teh program. So how can he get teh single machine copy running. You can't.
So to the IT Technication, get this man a Tui!

First Aid

We have been offered First Aid training at school, however this was during the holidays and I have been busy with other things like the ULearn conference. So when this came up in one of my emails from woodhill, I jumped at the chance and emailed the Deputy Principal straight away...

--- Email below ---

I was wondering if the school could pay for me to attend one of these first aid courses, it does meet a more specific need rather than the general first aid courses that have been on offer this year as I look after Mountain Biking, and it might be useful for me as the injures I have had this year are Mountain Bike specific (2 cracked ribs, a 3 inch gash on the left arm, and a fractured right shoulder).

14 October, $55 at Woodhill Forest, Hellensville.

http://www.peakrisk.co.nz/courses/firstAid/FirstAidMTB

I hope I get to go... three hours of training instead of 8 hours, sweet!

Extra Information
Well I get to go, early morning rise on Sunday morning, not too sure if I will take my bike though, still got a sore shoulder and haven't started physio yet on it.

Saturday, 6 October 2007

Problem with my macbook

there has been no updates to fix the daylight savings problem. My PC has had the fix applied, but the mac doesn't have an update. Not very good.

One conference finishes, another one starts

Just getting over the last conference, ULearn07 and I notice on my calender that the next one is due to start. K12 Online Conference, Just a pity that it is getting to be a busy time of year. Guess I will just have to make time for it.

Just a comment on the ULearn Conference, it only seems to be in Auckland that people walk out of things before they have finished. I noticed this when I went to a warriors game last year that people walk out when they are losing, this happened also at the end keynote Tony Ryan sitting at the back near the door I noticed lots of people leaving during the keynote. Pity they missed a wonderful and thought provoking keynote speaker.

And I will be going back to school monday and asking why noone from school attended the conference, considering it was in Auckland. We are supposed to a be lead ICT School, and staff didn't attend. I don't think anyone from the ICTPD cluster went. I was lucky that I managed to get in as a presenter and also on someone elses ticket as they couldn't make the ther two days. Though I would like to see Ewans keynote address, I heard people rave about it for two days. The reason why I didn't ask to go was that I have been to an Navcon Conference before and also to TENZ conference earlier this year. Let someone else go. I will however be attending the one in Christchurch between the 8-10 October next year.   

Friday, 5 October 2007

ULearn07 Day Three

BreakOut - Renaissance - Not Change - Jeremy Kedian, University of Waikato

We are at the beginning,

Final Outcome, how will we know that the education system has succeeded?
Caring, capable, articulate, reflective, contributing, gracious citizens, answer from Year 8 Students.

Secondary school format, certain number of teaching spaces, certain number of teachers(specialist), certain number of students, certain number of curriculum areas. Subject packages. You get a monster thing of a tyrant of a timetable.

Core function of a school is learning.

What influences Learning?
Social (40%)
Personal(40%)
School (20%)

13% of a students year is spent at school, taking in the hours each day.

Thinking Thursday, David Hargresly?
iNET organsation...

project must be at leat 6 months...

I will be honest, I fell asleep, too much drinking and a late night at the conference dinner last night.

Though I did wake up when he started talking about how teachers teach, and how teachers learn, there is a link between them

End Note Tony Ryan

Excuse spelling and grammar etc…live blogging this as I go….My notes…

Inspiring Classrooms

Saying exact words - for this stage of the conference you’re looking sensational

What is a “Keynote”?

SOngline - series of songs and chants from Aboriginal culture? What is our global songline in education?.. Pathway to be inspiring in classrooms.

“Exercise your Goosebumps” in terms of inspiring our classrooms

What will I implement from this conference?

What 3 main comcepts/processes/ideas are you most likely to take further?

Will they measurably enhance your students’ learning?

Will they support your present great practises?

Can you pay respect to your Self while implementing them?

How to I put it into practise?

What could you do?

what will you do?

How and when will you do this?

HOw will you maintain??

Other follow up options

De-brief by next Wednesday - go back to my blogs and write a reflection of the conference and what I have got from it.

Build the conference material into your professional dialogue

Find a life coach - find someone who can challenge me to be the best I can be!!!

How can I stay inspired throughout this ongoing learning

Systems and schools; Classrooms; YOU

What is inspriation/: Enthusiasm, passion, purpose, spirit

Systems and Schools

Practise ‘abandonment’ - drop things that aren’t working

Understand that you ARE the system - one teacher can change to whole school for the positive or negative - we all count

Develop sustainable practises -

Create Green Light environments - red light vs green light thinking - I can do environments

Classroom

Promote intellectual rigour

Encourage IBL

Be EXPLICIT - tick off the learning for the lesson with the kids

Help students to create solutions

Personally, locally and globally

Students Against Landmines, Schoolaid, global ideas bank

Own Inspiration

Second life, Third life, Fourth life

Who do you know who is truly inspiring?

Why is that person so inspiring?

What’s your score for ATTITUDE?

Maintain high energy levels

It’s not hard work

Fuel body so works as good as possible

Focus on the positive and meditative practises

Having depth, substance in life - give everything to life

Is it possible to be inspiring most (all) of the time?

Put a pen between your teeth and move your lips away from the pen so that they aren’t touching.

Young monk approaches the wise old monk…why do we have bto be celibate?,,,,two days later….It says celebrate……

Tell people the good things in life and education.

Be a mexican sky dancer…..

“Be the change you wish to see in the world”…Ghandi

Thursday, 4 October 2007

Classmate PC


Maybe the future of computing in education,

http://www.classmatepc.com/index.html

The Intel Classmate
  • Designed for education
  • Durable rugged design for children's day-to-day use
  • Small, kid friendly, form factor for classroom use
  • Easy to carry and light-weight
  • Education-specific features
  • Integrated software and hardware solution
  • Learning through fun, collaboration and interaction
  • Easy to deploy
  • IA-based, runs on already available content, applications and operating systems with full compatibility to standard PC ecosystem

ULearn07 Day Two

Right I am off with my swapped ticket to the conference, it should be interesting to see what breakouts I am registered for because they were done by someone else. Time for some different thinking.

First off an interesting presentation by Helen, Keynote speakers, using mind mapping software to present her presentation. Although there was nothing really new in it, it was a different way of presenting.

Next is a breakout for Space supporting Pedagogy.

factors that impact on teaching and learning, design features, trends, space, start with the students, not the building.

Students want to work with each other, online, in their time, in their place, doing things that matter, and to work with technology.

Learning styles, speed of change in the world, curriculum developments, changes to technology.

demand to cater for large number of learning modalities. Mostly design for lecture style and some individual.
Now we need to look at team collaboration, project based learning, story telling, independent study, peer tutoring.
Current spaces in classes/Boxes prevent sharing of best practice.
struggle to accommodate a range of learning configurations
cannot support different sized learning
not support efficient use of eLearning resources
Promote isolation, not collaboration.

Design features for the 21st century.
  • Welcoming entry,
  • Students Display Space, problems displaying digitial work?
  • Home base and Indidivual Storage.
  • Science Labs, Arts, etc.
  • Music and performace
  • Physical Fitness
  • Casual eating Areas
  • Transparency - Learning should be visible and Celebrated, High levels in visibility in formal and informal areas.
  • Interior and Exterior Vistas
  • Dispersed Technology, an integral part of our lives,
  • Indoor - Outdoor connection
  • Furniture - variety suitable for different learning spaces
  • Flexible Spaces -
  • Campire Spaces, space to learn from experts or story tellers, we need, rasised areas, moveabe seating...
  • Waterhole spaces - area for students to gather
  • Cave space, spaces for indivisual study, reflection...
  • Design for Multiple Intelligences
  • Daylight and Solar Energy
  • Natural Ventilation
  • Full Spectrum Lighting
  • Sustainable Elements
  • Local Signature
  • Connected to Community, way it is to be designed to be a welcoming place...
  • Learning Spaces
Do we really believe that staying with the old classroom model still works.

Space of the future
Flexible, visible, linked, cane be combined, display for traditional and digital work, real work spaces.
Learning Studios rather than classroom.
Mobile technology
  • Bringing it all together
Current Trends
Fat L Classroom, provides more opportunities, rearragne the classroom in such a way that you can provide individual learning opportunities.
Learning Street, maximise the use of space.
Pods/connections/vistas
Furniture - flexible,
Mobile Technology
Sustainability
"The future doesn't exist, we create it"

Question to ask the principal...
What is in the school 5 year property plan, how does our department fit into this?


Ten Trends for 2007 Derek Wenmoth
http://home.core-ed.net/features/core-education-top-ten-trends-for-2007

Ten trends to watch for regarding the use of ICTs in the NZ education scene in 2007

1. Focus on networks and infrastructure
2. The role of ICTs in personalising learning
3. Focus on technical interoperability
4. The rise of ICTs in Early Childhood
5. ePortfolios – fad or future-focused?
6. The challenge of Cyber-bullying
7. The challenge of social networking software and informal learning
8. Educational use of Online Games and Simulations
9. Developing 21st Century Skills
10. Alternative approaches to managing and maintaining ICT systems

Networks and Infrastructure
The different levels of IT infrastructure

Application Level
IP Level, (Internet)
Transfer Level
Cable Level
Trunking Level

Regional Loops (MUSH) - North Shore, Nelson
Advanced Networks, there is only one connection to the world advanced networks

Personalising learning
www.standards.dfes.gov.uk/personalisedlearning/
www.futurelab.org.uk/research/personalisation.htm

Interoperability

Learning Management System
Library System
Student Management System
These need to coexist.

Content versus Presentation
exelearning (open source product) , see previous blog
you need to have a SCORM/IMS to be able to use some features. blackboard, moodle, interact

ICT in ECE
Early Childhood centres using ICT
ECE ICT Strategy
Digital Stories - Manaia Kindergarten Blog
Iris and the Microscope - photo story of a 15 month using a digital microscope

ePortfolios – fad or future-focused?
mahara Puts ePortfolio Owners in Contol
www.cjlt.ca/content/vol31.3/tosh.html
where does all the stuff you create get developed, these are now no longer created on written pages, it is moving towards a digital nature.

Storage repository, search able, tagged, private
http://electronicportfolios.org

The challenge of Cyber-bullying
www.cbc.ca/news/background/bullying/cyber_bullying.html

The challenge of social networking software and informal learning

Struggling to stay focussed with this speaker, keeps going down tangents....

Educational use of Online Games and Simulations
  • Challenge
  • Feedback
  • Claer Goals
  • Exploration/action
  • Consequences
  • Problem Solving
  • Collaboration
Kids as games creator
missionmaker (cost)
scratch scratch.mit.edu
Alice Carnegie Mellon university http://www.alice.org/

Developing 21st Century Skills
New curriculum development, inform yourself
Key competencies
Literacy Development - see the core ed page for teh link to teh book, might be good to add to the knowledgenet usergroup.

Alternative approaches to managing and maintaining ICT systems

Keynote Helen Baxter - Renaissance 2.0

Learning Pathways - clear pathways and steps so that you can map your own learning. Showed a Mind Meister of her own learning pathway.

Knowledge Mangaement - knowledge walking out in peoples heads…needed to make it available to all (early 90’s).

Provide pathways of potential but not clear cut any more.

Educating New Leonardos

Now is the time to move into the future. Need more creative thinkers…NZ is full of them. History of backyard tinkering - #8 wire tradition.

Coined by NY times journalist - concept of multi disciplinary studies.

NESTA UK - amazing projects coming from it.

Big attitude shift towards life long learning - not just our kids but also for ourselves because we don’t know what we need to now. Need to implant the joy of learning - playful, engaging. Need more auto-didacts (people who go and just learn what they want to learn when they want it).

Western vs Eastern learning philosophies - eastern = learning over earning….continue to learn gives the opportunity to earn over a longer time. Not deliverers but rather facilitators. “What have you learnt today?”

Need to bridge gap of the two generations - Let generation Y teach you.

What will the campuses f the futures look like? Googleplexes – hybrid of work and play.
NZ curriculum shift from what to How style from 2009 – Mary Chamberlain quote – no need for knowledge banks on legs…got computers for that…people got to get used to this!!!
Machines supporting us.

LEARNING 2.0
1. Learn how you learn
2. Core foundations
a. Context is important
b. Avoid early specialism
c. Theoritical, practical, social
3. Provide pathways to open source knowledge
a. Intellectual property is holding back invention and innovation in some areas – should be secondary to public good. Paten law being abused now (?)
4. Life ling learning – develop skills around needs and interests – why do I need to learn this..when will I ever use it? Teach where the knowledge is not what the knowledge is? Einstein had his ph number and address in suit pocket on paper as opposed to in his head
5. More Montessori styles and practises - google founders

6.Physical space and time
Teaching and using the same kind of practises they will be using in their future work environments. Centres for academic excellences being used in the UK – community centres for learning. Schools of ambition and design schools 2.0. Virtual Rome

TEDucation - technology, entertainment, design; ideas worth sharing. TED under 30’s Eva Verte = age 14 came up with a breakthrough in Alzheimers

Cafescribe -online text books. Open Wikis.

Screen generation taking in huge amounts of information being taking on board through the reading of online media.

Able to re-use media over and over - podacasts and blogs able to leave comments in the future.

Careers 2.0

Projects vs jobs - jobs for life not around anymore - even BBC has everyone on temp contracts. Shift of perspective.

Powersearching- how to find information quickly and efficient.

Gaming - is important - training for future careers eg Robot Surgeons. Strategy an teamwork.

Manage knowledge not the process

Self Publishing for $$

How do we educate our leonardos?

You cant but you can instill the right attitudes !!!!

Something Fun!!

http://youtube.com/watch?v=SO5JY1KKYZo