Saturday, 29 December 2007
I normally travel south down the Island visiting various people and places along the way. However this time I have headed west to a small alpine village called Hanmer Springs. I came here six years ago through the Outdoor Education papers at Teachers College, where we walked the tracks, had a shower under a waterfall and had to plan and run a full day Outdoor Education programme with students from around the area. This has turned out to be an interesting experience coming back.
I booked my accommodation online, and should have realized something was wrong when I didn’t get a confirmation email from them, however being the time of year I though, oh they are just busy. I should have rang. I turned up to the top 10 mountainview holiday park expecting to have a tent site sorted, instead they wonder who I am and once they hear that I booked through the internet, they said “not another one, this is the fifth time its happened in the last couple of days, we haven’t been getting bookings from the internet, we need to get it sorted out” and me thinking, “its not my fault, do you have a tent site”. They had a tent site for one night and couldn’t fit me in for any more nights. So, its do I go back home, or find other accommodation. Right lets see what is round here. I find myself at the Hanmer Springs Forest Camp for four nights.
I have been and had a look around the camp and to be honest it hasn’t changed much. It has had new buildings which are cabins, however they were here last time. The old huts have had a paint job, and some more silver birch trees have been planted at the tent sites. It is good facilities and a large area to play, pity I don’t have a frisbee in the car, I wouldn’t be able to hit anything.
But why blog about this, I found a sign near the camp track which got me thinking. It explains that the camp track was built by Shirley High School Six form students in 1983 as a community project. (The camp track is a 1-2km walking track between the Forest Camp, which used to be a education centre and the Department of Conservation Information centre on the outskirts of Hanmer Springs in the historic forest) This has gotten me thinking about other school community based projects. In Christchurch there is a bridge built by Burnside High Students students at “The Groynes”. Where are these projects now. Will the new curriculum help get some of these projects off the ground again, or has the governments Resource Management Act, or the Health and Safety Act killed off these projects. The skills that these students learnt through these community based projects would have been, planning, design, building, evaluation and teamwork. Some of these are found in projects carried out at school. But to get students away from a school environment and out into the community is fantastic. In the following years those students would have gone back to the project and seen how it grew, changed, and is now used and would have said to their families, “I helped create that”. The amount of pleasure they must feel when they see it used now.
What other projects are there out in the community that schools help to create?
As I think about this, I start to see little educational projects, tree planting down a stream to show riparian planting and how it creates an environment that helps insect life and stream life improve, the worm farms that show students that they don’t have to throw everything away, recycling schemes that help the family at home with their green bin each week. Sustainability, is where this comes in, and environment. Litter campaigns to get the students to put it in the bin, this has been going for 18 years now and it still hasn’t hit through, and slip, slop, slap, put a hat on at school. But I guess my main point was where is the big projects that schools become involved in.
I find it difficult in my area of Technology ICT, can I say the same, probably due to the changing nature of ICT, in 1983 there wasn’t the internet, and computers were expensive and connecting them to each using ethernet. Not really, It is the hard materials that these type of projects get done, and with so many jobs in the education gazette crying out for technology teachers that this type of community project has probably been killed off, probably as well as the subject. Other groups that the seniors might get this type of project out of would the be environmental group at the school, or at out school the ki wanis,
As for me, tomorrow brings the Mountain Biking tracks of Hanmer, tracks like Dog Stream, Tank, and Detox. Then to take a load off in the thermal springs that Hanmer is famous for.
A hint: Purchase the Mountain Bike map from the local i-Site, the proceeds go towards maintaining and building new tracks in the Hanmer Springs area.
I also have been trying to find a wireless connection in Hanmer Springs to be able to check my email to see whether that a certain conformation email has come through. (It hasn’t) I have a copy of the Telecom Wireless Hotspots for New Zealand and there is one at the Heritage Hotel, however since I am not a resident of the hotel I have managed to find a location outside it on Jollies Pass Road, beside a walkway to gain access to the Telecom Wireless Hotspot. Pity that I was attacked by mozzies in the process of checking my email. I would have had a wireless connection at the top 10 mountain holiday park as they have wireless throughout the whole park. Oh Well, I am on Holiday.
Friday, 28 December 2007
The video game started not with a bang, but with a ping. Where did simple games like Pong and PacMan come from? And how did these global phenomenons usher in the videogame revolution?
In the late '70s, early '80s, video games gained their face. Game creators became more liberated to create more complex video games and icons like Mario and Zelda began to give way to grittier characters. Learn how video game technology has evolved.
Video games go 3-D, but the details they capture in the new virtual worlds are both awe-inspiring and disturbingly realistic. Critics begin to question if games are becoming too real, too violent, too addictive. Game designers begin wrestling with ethics.
"God Games" begin simulating entire worlds and allow players to experiment with sometimes troubling cause and effect. Artificial intelligence creates lifelike characters and opens up opportunities for new learning tools and for artistic expression.
Can a computer game make you cry? Games gain an emotional dimension, interpersonal connection, and Hollywood worthy story lines as they evolve and move onto the Web. What do these virtual world games tell us about the way we live in the 21st century?
Saturday, 15 December 2007
webstandards and the problems that are faced by companies creating a broswer.
Andy Clark, blogger fustrated by the standards committees.
Standards are necessary - if you put someone in complete control, to much power to a single entity. Probelms occur and someones own opinion it overruled.
Clean up existing standards - work going on to tidy up existing standards. defacto stanadrds and the dejuro standards.
CSS 2.1 spec still being worked on
W3C not interested, stopped work on the new standards, WhatWG, open standards group, clean up standards.
Add new features - otherwise things go pear shapped. OpenWeb, make a competitive platform. Video tag for HTML 5
Search google for HTML 5
Webforms2 extnsion to make html forms more usability.
Thursday, 13 December 2007
Enough about that, my time to leave the school has not yet come.
Moving Day, it is almost a tradition at the school in the last week of term 4 changes happen, not the changes that you may think. This is the IT change, computers on the move, where unsuspecting year 9 and 10 students become pack mules to the rubbish skips and classroom hauling monitors, keyboards, mice, all the all important system unit to far flung places around the school. Who helps look after all this, the IT teachers, we become the Marshall's at the door telling students to stop, go, what to pick up and where it goes. You kind of feel like wearing a bright orange vest and having walkie talkies with you to make sure the puzzle is going together at the other end.
Yes there are the students that don't want to do it, and the others that "get lost" coming back from hauling computer parts around the school, but it is fun and the students geta buzz out of it because they are doing something different. They are not sitting in a classroom for the fifth time that day watching a video, they are being helpful.
I wish to thank the many students over the past 5 year I have been at the school that have helped move computer, open up the fresh batch of computers that come each year. Thank You.
Monday, 10 December 2007
I have been busy looking for ideas for my students next year, some new ways of introducing programming for visual basic. One of the websites I came across provided me with a full course that teaches the students programming through four teenagers and a trip across America.
It is called "Code Rules" http://www.academicresourcecenter.net/curriculum/pfv.aspx?ID=6667
This set includes student curriculum that can be printed, as well as an "eBook" that can be burned to CD for each of your students. For instructors, there is an annotated version of the curriculum, projects and solutions with notes about teaching strategies, possible student questions, and points to emphasize.
Also included are PowerPoint slides to introduce the key concepts of each unit; exams, quizzes, and exercises; explanations and solutions sets for projects; additional projects; and a list of additional Web-based resources.
Designed to be used with VB 2005 Express in high schools it can also be used with Visual Studio 2005.
I hope to use this with my students next year.
This is from Microsoft
Category: Teaching Resources
Submitted Date: 08/06/2007
Code Rules is a course designed to introduce high school students, with little or no background in computers or computer programming, to the basic concepts of computer programming. The course teaches students to create fun and engaging applications using Visual Basic.Net. Through the course students are introduced to the basic concepts of programming, such as writing pseudo code, creating forms, defining and declaring variables and more. Code Rules has been designed to allow students to explore the world of programming, practice creating code and develop a better sense of what it means to be a computer programmer.
Within the course, students are cast as contestants in a new game show called "Code Rules." The game involves four young contestants who travel the country in a Winnebago stopping at offbeat places to face coding challenges which must be mastered before they can move to the next segment. As the students travel from place to place, their traveling companions, Jen, Kirk, Nikki and Cliff will teach them the programming skills needed to face the next coding challenge. At the end of each segment of the trip they will face a variety of engaging, real-life challenges to demonstrate their newly acquired programming skills. These projects will be items useful to students as they travel such as developing an interactive travel journal, a simple form to track mileage and gas consumption, etc.
This curriculum is available in the Academic Resource Center.
Saturday, 8 December 2007
Honourable mentions go to Scrabulous - the scrabble knock off that made grandma’s game cool again - and all the great abandonware out there.
Play Desktop Tower Defence »
Tuesday, 27 November 2007
Hacker High School - Security Awareness for Students
A link to the Hacker High School web site went to the AP CS list the other day. It is an interesting site with lessons and exercises about computer and network security. It appears to be designed to be used in either a classroom or a computer club or other after school program.
Some students today know a lot about network and computer security. Some of them use that knowledge for good and others, well, perhaps not good is a better way to put it than bad. Students are curious and they are going to try to find out what they can do and where they can get in. The other students, the ones who don't know as much, probably need a good education in security if only to protect themselves from their peers. And of course there are hackers out there who have clearly ill intentions and we need to protect people from them as well.
This Hacker High School page looks like a site that teachers and parents should know about. If nothing else you really don't want to be in a situation where the students in your life know more about security than the adults in their life.
Wednesday, 21 November 2007
Monday, 19 November 2007
Thre are two versions of asttle, one that is pre-installed on a laptop, that is the single user, and the other which is a network version, the multi-user. the majority of laptops in the english and maths department use the multi-user. The teacher has been using for a number of years and when she got her new laptop didn't think to have it changed over to the multi-user. Now all of the year 9 and 10 english exams have been setup from her laptop on teh single user account. Imagine when it came to putting these results in by the teachers, they could not find the test, the other option was to redo the entire year 9 and 10 english exam. No way.
So one thing about asttle is that it always, and I mean always backs up. Everytime you do something in it, it backs up.
Sunday, 18 November 2007
So far the dates for the Auckland Winter Series are: AKSS WINTER SERIES:
Round 1: Sunday 6 May Riverhead forest
Entries close: 14 May
Round 2: Sunday 10 June Woodhill Forest
Entries close: 11 June
Round 3: Sunday 5 August Hunua Forest
Entries close: 30 July
Round 4: Sunday 2 September Whitford Forest
Entries close: 13 August
The new bike I am getting from Cycle City is a Avanti Hammer
Saturday, 10 November 2007
Friday, 9 November 2007
One of the things has been having the time to develop these sites. Looking after four very individual sites has been a busy task. I did not use any Content Management System or online system either. All was developed and designed in Macromedia Dreamweaver, Macromedia Fireworks and Macromedia Flash (for those .flv files we all love)
Next year the house leaders will be looking after the content for there own houses. This poses a few technical problems, access to the web server, access in general, how can they post information online simply enough without having to know CSS or HTML.
I have looked at changing one of my five servers over to windows XP and installing WAMP on it as demonstrated at the TUANZ conference this year, built into it apache, mySQL, PHP, all up to date and integrated fine. For the house websites they will be running wordpress with customised themes for each house. This allows for house captains and leaders to put up there own content through online forms as well as I will look at putting gallery plugins on so they can upload photos to make things more interesting for the students.
I have now started on getting these up and running, and one of the problems I am now faced with is actually trying to find themes that are good. There are many themes out there but most of them are too simplistic, to be able to keep students attention, they have to be graphical and have colour. We are trying to promote house participation and house spirit, not "the monkey made me do it".
Tuesday, 6 November 2007
Technology, as an essential learning area, has a responsibility to work with all other learning areas, to ensure the key competencies are mediated into the classroom curriculum. The capabilities captured in the identified five competencies are all essential underpinning capabilities for the development of a technological literacy that is broad, deep and critical, in nature, and one that will result in increasing student empowerment for future citizenship.
Key competencies cannot be developed or evidenced outside of a context. Technology provides a range of diverse contexts, where students can develop their capability with regards to these five foci as well as use these capabilities to support their learning in Technology. In this way, technology-specific learning intentions and the competencies become integrated within the learning environment.
All aspects of Technology education would support and be supported by an increase in sophistication across the key competencies. Examples of how the key competencies are embedded within technology learning experiences are discussed below.
Critical and creative thinking are essential in Technology education, as is the development of a high level of awareness of the nature of thinking underpinning any decisions. Being able to step back from a situation and answer questions such as ‘what is happening?’, ‘why is it happening?’, ‘should it be happening?’ and ‘how could it be done differently?’ rely on sophisticated thinking skills.
These thinking skills are required across all three strands of technology education. Such thinking is essential for making informed decisions that are based on ethical, as well as functional grounds, allowing for an understanding of fitness for purpose, as well as explorations of the fitness of any stated purpose. For example, opportunities for the enhancement of such thinking are clearly identifiable when:
- undertaking technological practice within innovative problem solving situations;
- understanding the nature of technology through exploring examples of existing technological outcomes or developments, debating contentious issues, or projecting into alternative scenarios; and
- developing key technological knowledge that is then used to evaluate within technological modelling, or to explain how and why products and/or systems work.
The specialised language of technology provides significant opportunities for enhancing students’ competency in using language, symbols and texts. This will be reinforced through informed technological practice where critical evaluation, as part of ongoing experimentation, analysis, testing and final evaluative judgement, requires students to understand specialised language, symbols and texts. They will also need to use such language to explain and justify their thinking across a diverse range of contexts.
Because Technology draws knowledge and skills from across a range of learning areas, and additional disciplines, it allows students to appreciate how and why language, symbols, and texts differ across disciplines and contexts, and why what is thought of as accepted knowledge and skills, also differs across disciplines and contexts. Understanding these differences supports students in their ability to interpret and use language, symbols and texts in appropriate and informed ways in their own lives.
Relationship: Managing Self
When undertaking their own technological practice, whether individually or as part of a group, students are required to develop self management skills in order to effectively plan ahead and manage resources efficiently. The ability to understand and undertake technological practice that takes account of wider social and physical environmental factors allows students to develop a strong sense of self, and recognise how they can manage themselves within and across a range of life situations inside and outside of formal education communities.
Relationship: Relating to Others and Participating and Contributing
Technology programmes provide opportunities to develop ongoing and mutually beneficial community relationships critical for developing student competency in relating to others and participating and contributing. Because of the inclusion of a range of knowledge and skill bases in Technology, both technological and those from other disciplines, it is common practice in Technology education to draw expertise from the community and/or industry. Inviting people in as valued experts provides a meaningful opportunity for the development of relationships with a range of people from local and extended communities. Students also often work alongside service organisations, local businesses and other community groups to meet an identified school or community need. This type of working relationship allows all parties the opportunity to develop a better understanding of the ethics, beliefs and understandings of respective groups and individuals, and thus enhance future interactions.
All technological practice and resulting outcomes are situated in specific social and physical environments, resulting in both opportunities and constraints. Conflicts and the need for collaboration are common factors that students in technology have to deal with. In turn, students become empowered to operate across a wide range of social groups. This is key to increasingly sophisticated technological practice, and the development of a broad and critical understandings of technology’s role in contemporary society.
copied from http://www.techlink.org.nz/curriculum-support/tech-key/page2.htm
Monday, 5 November 2007
can't wait, are they going to annouce how it is going to be implemented in schools. Teacher only days to get it going and schemes changed. Or is it just going to be the big stuff.
Saturday, 3 November 2007
Denial of service attacks and how to prevent them
Now one of the things I like about the learn-networking is that they have is a quiz at the end of each.
Monday, 29 October 2007
As I look around the internet a website fostered my interest www.learnerblogs.org
One site has a number of thinking tools
"With the help of technology, teachers will be leaders in the transformation of education around the world." – Craig R. Barrett – Chairman, Intel Corporation
Free tools and resources for educators support collaborative student-centered learning. Online thinking tools are active learning places where students engage in robust discussions, pursue investigations, analyze complex information, and solve problems.
Key Stage 4 handbook for teachers
Key Stage 4 school training manual
Leading in Learning: developing thinking skills at Key Stage 3
Also found a video on Thinking Skills
one of the other things found is netsafe information, although it doesn't go with this title it could help with the US 2781
I am now thinking of get a del. account :(
Sunday, 28 October 2007
Wednesday, 24 October 2007
Collaboration, the idea is about learning
Information is vital,we are not rote learning anymore, we need to promote information,
The relationship between the kids in the classroom, they need to see themselves as legimate creators of information, who are questionnaires of information, see if things are real, truth from fiction, bias, viewpoint...
to be a good citizen, a good thinker, no matter where you live..
Curriculum, we have a mandated curriculum, our relationship to the curriculum and what is in the curriculum, looking at the curriculum constantly and trying to decide what is important, what do they students need.
This is the first part of the video.
Tools in the classroom, blogging, RSS feeds, talk about information, collection of information, flickr, podcasting, voice threads, its about the tools. Classroom concerned with information, relationships, local and international. Internet based tools, These are free for teachers, students, they are what is helping to make learning interesting for students.
Relationships, factors, change in a classroom, change in power... they change the relationships between people. Changes the relationship between students and information.
Why technology assessments suck, they focus on the skills, its about connections, learn from each other and see new things.
It does however appear that netsafe website is unavailable at 11:20pm
however through google and the use of the View as HTML I can copy and write
Attached is a draft release of the NetSafe Cyber Citizenship Education Matrix. The purpose of this document will be to provide teachers and schools with a framework for developing good cybercitizens. It is intended that the document will be referred to when planning for the integration of cybersafety into school curriculum delivery.
A good cybercitizen is a person who uses ICT confidently, safely and responsibly to participate and collaborate online.
As NetSafe publishes our own cybersafety learning material, or becomes aware of other cybersafety material available, we plan to provide advice as to how such resources could be used to promote the competencies outlined in the Cyber citizenship Matrix.
The Matrix is a fairly high level document and at first glance may not seem to provide too much specific advice on the skills required by modern cybercitizens. This is intentional as the document is intended to allow cybersafety education to be integrated throughout the official New Zealand Curriculum, while also allowing educators scope to focus on particular areas of interest or relevance. It is also necessary to future proof the framework as much as practicable and not therefore become bogged down with specific technologies. As the technologies and the issues that cybercitizens face come and go, schools and educators will be able to flesh out the matrix with more specific and relevant learning objectives.
The layout of the document will be recognisable to anyone who is familiar with New Zealand curriculum statements. Down the left are the three ‘Attributes’ (or strands) as referred to in the definition of a good cybercitizen. Across the top are a sequence of year levels beginning with early childhood education, and moving through to year 13.
Unlike the New Zealand Curriculum which is arranged in levels and recognises that students in the same class may be performing at different levels, the cyber citizenship matrix is divided into distinct year bands. This is because the matrix is intended as much to provide a framework for linking in cybersafety learning materials from around the country and around the globe, as it is to provide a suggested learning progression.
Once complete, the document will be published on the NetSafe website.
NetSafe would like your feedback on any aspect of the NetSafe Cyber citizenship Education Matrix (including the title). Some suggested areas you might like to comment on may include:
• The attributes
• The breakdown of the bands
• The progression within each attribute in terms of developmental appropriateness
• How the language could or should help link through to the key competencies as outlined in the New Zealand Curriculum
• The overall complexity or simplicity of the document
• The practicality of providing such a framework
• The perceived usefulness for educators…
Ideally I would like to gather all feedback by 31 October
I thank you in advance for any time at all you may be able to spend providing feedback. Your feedback is valuable. Please email it to: firstname.lastname@example.org
There are three sections
Confident - Understand the impacts and potential of use for individuals and society.
Safe - Apply sound cybersafety strategies which promote personal safety
Responsible - Understand, follow and promote cybersafety guidelines which support community safety and wellbeing
There are two sections for secondary schools, Year 9-10 and 11-13, these will have some comment on tomorrow after I get some sleep and my laptop's battery gets charged.
Right to carry on,
Confident - Investigate and compare how cyber-technologies are used by individuals, groups or organisation to achieve various objectives both positive and negative.
Safe - Display appropriate methods of dealing with specific cybersafety incidents, and explain how the risk of such incidents occurring could be minimised.
Responsible - Contribute to the formation, review or promotion of cybersafety guidelines for a community.
Confident - In the context of cybersafety, analyse and critically evaluate the impact of cyber technologies on themselves and society both in the present day and historically.
Safe - Is able to proactively identify and appropriately respond to a range of potentially risky incidents when using cyber-technologies.
Responsible - Demonstrate a commitment to interacting within the online environment in an ethical and socially responsible manner.
These have a great amount of interest to me, as we are using more and more web technologies in the classroom, however, it is how they are being used outside the classroom. The way they are being used at home by various students to inflict pain and hummilation on some students, and the other adage of one you put it up it will never disappear. Students and parents have never had to deal with these forms of electronic bullying and problems before. A photo you could tear up, paper could be burnt. But once you put something online, it will be there forever.
having a look at the draft matrix I like the idea of it. Though there are some things I would like to comment on.
The attributes, I agree with safe and responsible, though I feel confident isn't the right word when it comes to understand the impacts and potential of ict use for individuals and society.
The breakdown of the bands, these are clearly defined at the lower levels, however I feel there does need to be a change at the senior end 9-10 and 11-13, I would probably look more at 9-11 and 12-13. the reason for this is 9-11 are still grasping with the ICT and internet use. 12-13 would be able to have the life skills and the reasoning to be able to pro actively identify and appropriately respond to a range of potential risky incidents when they are using cyber-technoloiges, as well as being able to demonstrate a commitment to interacting within the online environment in an ethical and responsible manner, I know at our school we make more use of the LMS and other web 2.0 technologies at years 12-13 and this would be a way to be able to monitor them against the attributes.
I would like to see more details or achievement objectives before I comment on the key competencies, or at least wait till after the new curriculum has been announced and have some time to digest it.
It is a overally simple document that will help with early childhood and primary education, though I think it needs some more complexity when it comes to the secondary schools. more details may help with this.
I look forward to providing this framework to my year 9 and 10 students. As well as looking at the challenges I could pose to my year 12-13 students. I don't think I have the space to be able to fit it into my year 11 scheme though. The Health subject in the school may be able to focus on this, health will be able to catch those students that miss the ICT modules throughout years 9-10 and help the students to meet the bands. Although some development may need to be associated with this for those non-ICT teachers. I also am interested in educating the students through the netsafe network use agreement that we are busily trying to get together for the start of next year as we make more use of web 2.0 technologies and mobile devices as well as research in the classroom.
This will be able to help all teachers met the set of guidelines to help our students with internet access and to be able to educate parents and caregivers on the use of ICT and the internet through schools. This has already started through the use of hectors world in the primary schools and has been missing in the secondary schools where teachers are making more and more use of ICT without knowing what students are accessing. I remember a couple of years ago when students asked if they could access bebo in class time, and now dealing with the issues that bebo has throughout the school. Students are great adapters of ICT and teachers need to be able deal with those issues in a more confident and collaborative manner. this document may be able to help get some Professional Development to educate teachers about how to use the internet in a collaborative and safe manner.
I look forward to seeing the next stage of this matrix and I believe it has been a long time coming, I remember going to a netsafe meeting a couple of years ago where this question was asked. Since then I have been wondering how it was going to be incorporated into a already fill curriculum.
Thank you for your honest and detailed feedback regarding the cybercitizenship matrix. Your comments will be most helpful as we develop his document further. I appreciate the pressure on your time, especially at this stage of the year.
To briefly respond to a couple of your comments:
The term 'confident' comes from the government's digital strategy. Within the strategy, the NetSafe programme is designated a major contributor to the confidence strand. At NetSafe we think of cybersafety as a learning enabler - giving individuals confidence to realise the benefits ICT can bring. I have tried to incorporate this into the 'attributes'. Perhaps it is more about awareness than understanding of the impacts of the use of ICT?
We could provide more detail in the upper year levels. In fact in the original document there were two further 'stands. I am also hoping that the detail will actually come as the matrix is populated by example lessons and resources either from NetSafe, overseas, or teachers themselves. We are still developing this process.
Thanks again for your input.
The feedback from the staff is that the Pohutakawa House name is too long, why are there two K's (Kauri and Kowhai) and that if we are to continue to use the Red, Green, Gold, and Blue that the name change is just a farce.
It needs some more thinking.
If we are to use the trees as the identify of the houses then we need need to change the systems in the school to the new system. Instead of R10, G10, B10, and O10, it gets changes to R10, P10, K10 and T10. the T could be changed to Totara House instead of Kauri House.
Identity of the houses and providing values to the students was what pushed the changes in the first place, it has been killed with the current solution.
Monday, 22 October 2007
We see a lot of impressive hacking in the movies, not just taking over individual PCs but whole traffic systems and top security databases.
Waterloo Station formed the back drop for The Bourne Ultimatum, one of the biggest movies of the year, in which Americans take over all of the CCTV cameras. But just how realistic is that scenario and worse, what about a hostile takeover?
According to Sarb Sembhi, IT systems analyst at ISACA, local authorities and the police use network TV because they can take advantage of the technology that allows them to view cameras on any system.
"Unfortunately not only does it enable them to view any camera on their system from anywhere, it also means that other people who shouldn't have access to the system may end up having access to the system.
"Anyone can do this if they know what they're doing," he said. "It may not be friendly governments, it could be any government anywhere, it could be criminals, it could be terrorists, they can use the system for their own advantage."
Paul Docherty of Portcullis Security is paid by governments and blue-chip companies to hack into their systems. He has been doing it for 20 years and believes hijacking Waterloo's cameras would be a difficult feat
"The Waterloo scenario is a wired system, whereby they're wired back to a central control station. You would need access to the control station in order to gain access to the data.
"In a wireless network the camera has to broadcast whatever it's picking up across a wide area in order for it to be picked up by another system and then relayed to whoever is looking at the data. In those instances anyone can sit nearby and intercept the data.
"Potentially they could inject [data] packets in that so they could control the camera and point it in the direction they wanted it to go."
What about our critical infrastructure. Could undercover hackers take down a power plant or bring transport to a standstill?
An Associated Press report was posted on the internet last month showing an internal test by Homeland Security in the US to see if hackers could tap into the power network and shut down a turbine. The test succeeded.
"If you know something about SCADA technologies you can introduce yourself inside the network of power plants, nuclear plants, pipelines, hospitals, traffic lights in the city, airports and so on," said security evangelist Alessio Pennasilico. "Once you are inside the network you can do whatever you want."
SCADA is an older system that is still very common today. It allows you to acquire data from multiple systems.
Mr Docherty said: "In terms of how realistic the attacks are, personally I think it's somewhat over dramatised, the stuff of James Bond movies.
"However, what we're seeing is a convergence of technologies, and many SCADA systems are now connected to other systems which are connected to the internet via the IP protocol.
"So potentially the theory of the attacks is true. I think the realism of them is not so true. Someone would very much have to understand many, many proprietary systems in order to make such drastic attacks happen."
Hackers can also target individual mobile phone users if they are using a Bluetooth headset or a handset with Bluetooth switched on.
Bluetooth headsets rely on the phone to transmit radio waves to the earpiece. But they are vulnerable. That two way connection can also be a gateway into your handset.
"If there is a specific flaw in the Bluetooth implementation in the model of the phone you won't even know that a hacker is getting into that specific phone," said Dino Covotsos of Telspace Systems.
"A lot of different techniques include bluesnarfing and bluebugging. You can actually do something called STP tooling."
STP tooling is a method for establishing the services that are supported by the phone.
Mr Docherty showed BBC Click how easy it was to pull off all the contacts from a phone placed 10 metres away from him. Using a laptop and a free computer program available on the internet it took him about a minute. The target's phone did not make a sound.
He could also have lifted calendar and diary entries and even have made a call without the phone owner's knowledge.
Fortunately, newer Bluetooth phones now warn the user.
Portcullis Security also hacked into the programme's wi-fi system in 10 minutes. It was "protected" by a 128-bit WEP encrypted password. Again the programme they used is free and it is available on the internet.
You still need a degree of expertise to pull off a movie-style spying attack but it does seem that wireless systems in particular, while convenient for us, have made the hackers' lives a little easier, and those spy scenarios just a little more realistic.
Blue House becomes Kauri House
Green House becomes Rimu House
Red House becomes Pohutakawa House
Gold House becomes Kowhai House
This will still cause some of the headaches for us in the ICT department, we have had problems with Green and Gold house because these are included in a students login, now we have the same with Kauri and Kowhai.
Why could one of these not have been named Totara!!!
"Over at the education site Game Career Guide, they've got an in-depth primer of Microsoft's XNA, including interviews with Julie Ellen and Joe Nalewabau of Microsoft about the PC and Xbox 360 indie/student homebrew construction tool, as well as chats with two developers (Benjamin Nitschke and Alex Okafor) who have worked with XNA to some notable effect. Microsoft's Ellie claims of the efforts: 'Homebrew and independent developers are often very talented and have lots of creative ideas. Being able to officially write games directly for a retail console right at home is a first and could be very empowering for them. For the homebrew and indie scene to succeed we need to provide two things: great tools and access to a large audience. We're working on both.'"
Some of the sites that are listed are
XNATutorial.com also offers video tutorials - there's an amazingly comprehensive set there too, with everything from installation, right through to information on physics engines, and an immense number of topics in between.
XNADevelopment.com hosts a number of interesting written tutorials on subjects like installation and how to find the first tutorial within the XNA download, as well as source code and instructions for developing a Tetris clone, and a simple controllable 2D sprite.
XNAResources.com also hosts a variety of tutorials, with a well put together series on map tile engine creation, plus they offer links to more advanced subjects like 3D engine solutions and stroke based text rendering.
Last, but certainly not least, is Xbox360Homebrew.com, which hosts tutorials, news, a gallery of user uploaded XNA titles, forums and developer blogs, and provides and excellent hub for the XNA community.
Sunday, 21 October 2007
For many, "Vice President in charge of R&D" sounds like a good job - reputable, good pay, and maybe even exciting. But tack the words "at Apple Inc." to the end of that title, and you have, well, a whole different barrel of apples.
Steve Wozniak didn't earn this job with a good resume. He forged it, inventing the first single-circuit motherboard with embedded ROM in 1975. He and Steve Jobs had to sell their most valuable possessions to assemble a product line of Apple Is. Some people can't put a price on fame and fortune, but they can. About $1300 and a few IOUs later, they kinda made their money back.
Follow the Silicon Road
Wozniak didn't want to become an entrepreneur or take the world by storm. He was content with his job at Hewlett-Packard and even more content as a hobbyist. Wozniak worked at a bench from 1973 to 1976, optimizing designs for calculators other EEs developed.
"I wanted to be an engineer in a lab," says Wozniak. "The spirit of engineers was most important. I loved the engineers, loved the project, loved the company!" He spent his days at the plant and his nights batting around design ideas and inventions with the Homebrew Computer Club. "I'd be off in 'computer design world' and Steve [Jobs] would ask where it could go," he says.
This dynamic led to the sale of a wood-cased CPU comprising roughly 30 chips for $500 (then $666.66 after a markup) and the beginning of a revolution. "After Apple I, every computer used a keyboard," Wozniak says. "Before, they used geeky switches. It was a trading transition in history." The Apple I was a quantum leap in the available technology. Before Wozniak threw his hat into the ring, the Altair 8800 was the closest thing to a personal computer.
"You could turn it into a computer, but it was basically an Intel processor," Wozniak says. "A computer to me has to have the ability to program. Altair couldn't. You had to buy extra cards. I was well past that point. Sure, it used ones and zeros, but I wanted a real computer my whole life. I would've sold my house for a computer, but it had to run a program."
He created a motherboard and compatible components, but the product was more for a hobbyist or engineer than a consumer because users would have to add input sources, a keyboard, casing, and a display themselves. He wanted to bring it all together so anybody and everybody could operate an Apple right out of the box.
Born in 1950, he didn't have much technology available to him as a child, but he would stumble onto information about technology here and there. Picking up little scraps wherever he could, these bits of info would be like "little secrets" to him and his young mind - information he would keep that other people would flat-out ignore.
When he was 10, a book about a ham radio operator inspired him to not only earn a ham radio license, but build a transmitter and receiver by hand as well. He also conjured a game where he would experiment with adding and subtracting transistors to his gadgets. "It helped me very much. You sit down, think, plan, and make sure what you build is efficient. It's good practice for what engineering involves," he says.
Wozniak left HP in 1976 and formed Apple Computer with Jobs, asking himself how he could put these things in his head into the smallest number of chips. As a result, he would write his own Basic, even though he never programmed in Basic in his life. But that wasn't the only thing he would have to do on the fly. "Everything was created from scratch," he says. "Everything I did had to be made up for the first time."
Wozniak abandoned the wooden frame for plastic, added dynamic memory, had tape interfaces, and added color graphics and sound. "The Apple II connected everything. [It] was a 'Woz' from the ground up," Wozniak says. Users could also plug in cards to add floppy-disk or printer functions - or as Wozniak calls it, a true "plug-and-play" device.
Seeking Alternative Routes
Because of Wozniak's work with Apple, he had to bury other projects. You would think such a computing mind wouldn't drift toward other desires, but an urge to impart knowledge hibernated in his mind. After he left Apple in 1985, he formed his own company, CL-9 (Cloud 9). But after two years, he moved on from that to other endeavors, including teaching kindergarten.
"I wanted to be a teacher my whole life," he says. "Secretly, I wished it. I can't tell you how much fun it was when they learned something." Though he doesn't believe it would work for other people, discovering how much you can smile over how much you can frown is a lifestyle. "I was just doing what was fun for me," Wozniak says. "I would be doing this at home if there was no money."
He misses his time with the Homebrew Computer Club and Apple, though today you can find him playing polo on a Segway, working at Jazz Semiconductor, or off promoting his autobiography. "I miss the technical camaraderie," Wozniak says. "The whole feeling of being on a revolution, on the edge. I miss the intuitive philosophies."
Saturday, 20 October 2007
Review of how changes that the group came up with in previous meetings have been demonstrated and fine tuning asked for. I start to wonder why these changes don't come in sooner, and the answer is that they are still in "Alpha" or "Beta" stages and need to go out to "beta" schools.
Looking at SCORM compliance and how these could be incorported into KN. Looked at exelearning.org
A website was demonstrated during the break called www.scrapblog.com
Review of the Interoperability project, musac and knowledgenet were the joint SMS<->LMS operators chosen.
These have been mostly primary schools and one secondary school, so some features that should have been added for secondary schools haven't been yet.
Now this leads to a common problem, Professional Development. We are undertaking this at school with the KnowledgeNET product. Now if everything datview have said today the PD that we do this year will be out of date in January as knowledgeNET will be undergoing some major development changes, in the way it looks and by what it provides for teachers and students. Do we do the development now or hold off?
Wednesday, 17 October 2007
It is strange sitting here surfing the Internet before the play starts in the audience reading about what the play is about.
It is set in the small town of Te Parenga just after the Second World War. Aroha Mataira struggles to keep her family together in the face of new challenges and Johnny's alcoholism. The play shows the struggles of Maori people to keep their land and culture intact in the face of change and how actions in the past continue to have consequences for later generations.
Saturday, 13 October 2007
Tuesday, 9 October 2007
(http://www.imdb.com/title/tt0317740/) where Seth Green plays a hacker. The most memorable scene for me is where he hacks into the city's traffic control system to create traffic jams so that the thiefs have a clear get away path, and the cops can't get to them due to the backed up cars. This scene is closer to the end of the movie. I think Seth even mentions a popular exploit in order to get into the system.
My students and I were talking about this as they were trying to talk me into playing more movies for them.
Their favorite was Office Space (1999)
http://www.imdb.com/title/tt0151804/. There is a scene where they're planning to insert some code in the company's code that will take the fractions of a penny, and instead of rounding it off, it will take that fraction and deposit them into a secret account. The idea being that tens of thousands of transactions a day will add up very quickly. The funny part of this is where they're sitting around a kitchen table discussing the idea and trying to get the third person involved. At some point they say "This doesn't go anywhere beyond the three of us.", and you hear the neighbor from next door shout "Don't worry man, I won't tell anyone".
Finally, if you would like more accurate portrayal of how hackers are portrayed, there's the movie Freedom Downtime (http://www.imdb.com/title/tt0309614/), which is an excellent documentary.
Many interviews with and about hackers. I showed this movie to my class, and this is what got them attempting to talk me into showing more movies.
I'm sure there's many more, but I'll give others a chance. I would also be happy to assist with this project should there be need.
This may need some translation
* Terminator III: Rise of the Machines
En la mitad de la pelcula aparece un virus incontrolable que parece infectar todos los servidores importantes en el mundo, sin ninguna atencin al tipo de servidor. Luego, el general a cargo de la construccin de Skynet "activa" a Skynet, para darse cuenta segundos despus que en realidad era la misma Skynet la que estaba simulando un virus a escala mundial (What?!?).
* El imperio contraataca
R2D2 abriendo las puertas de la ciudad BESPIN, ahi, ademas de abrir las puertas, el computador de la ciudad le "cuenta" que han deshabilitado el hiperimpulsor.
* Juegos de guerra:
al comienzo, cuando el protagonista entra al computador del colegio y cambia sus notas ...
Otra ... el protagonista busca la forma de entrar al computador que le ofrece juegos y encuentra que el nombre del hijo del creador de la maquina es Joshua ... que resulta ser un password back door
* Matrix III
Triniti debe hackear un edificio y se conecta a una consola para hacer "ssh -l" a un terminal y luego utiliza nmap para hacer un port scanning
Otra ... caminar por los pasillos ocultos al operador que son las backdoors de las maquinas
* Star trek la Ira de Khan
Kirk enva un codigo de deshabilitacin a la nave que habia raptado khan para hacerse del control remopoto (un backdoor)
* El da de la independencia
Cuando insertan con un mac un virus en el sistema extraterrestre que lo inutiliza (aunque la pelicula es super debil en lo tecnico, esta escena es representativa).
* Mission Impossible
dos escenas al entrar al cuartel de la CIA, activan las alarmas de incendio para violar la seguridad fisica del edificio. Se saltan las barreras de proteccin
Otra, cuando utilizan un bloqueador de seales de celulares.
Translation Spanish to English
In half of pelcula it appears an uncontrollable virus that it seems to infect all the important servants in world, without none atencin to the type of servant. Soon, general in charge of construccin of “active” Skynet a Skynet, to occur to account seconds despus that in reality was the same Skynet the one that was simulating virus on world-wide scale (What).
* The contraataca empire
R2D2 opening the doors of city BESPIN, there, besides to open the doors, the computer of the city him “it tells” that they have deshabilitado the hyperimpeller.
* Games military:
in the beginning, when the protagonist enters the computerof the school and she changes his notes…
Another one… the protagonist looks for the form to enter computer that offers games to him and finds that name of the son of the creator of the machine is Joshua… that back turns out to be password door
* Matrix III
Triniti must hackear a building and it is connected to a console in order to do “ssh - l” to a terminal and soon uses nmap stops to do port scanning
Another one… to walk by the hidden corridors to the operator whom they are backdoors of the machines
* Star trek the Wrath of Khan
Kirk enva a code of deshabilitacin to the ship that habia raptado they khan to become of the control remopoto (backdoor)
* It gives of independence
When they insert with mac a virus in the system extraterrestrial that makes unusable it (although the film is super weak in the technician, this scene is representative).
* Mission Impossible
two scenes when entering the quarter of the company, activate fire alarms to violate the physical security of building. The barriers of proteccin skip
Another one, when they use a blocking one of seales of cellular.
Monday, 8 October 2007
We use a managed network solution and it runs pretty much excellent however we have been having issues since the 18th September. that is when I emailed through one of the problems.
Not being able to access learning resources, this comes with a 507 null exception error.
We had a number of updates carried out throughout the holidays, IE7 and Adobe acrobat 8 and DST update. Now some students have managed to login without any problems, other have had a box that appears saying setting up personalized settings, and after setting up IE7 setting it just hangs. Now we have been waiting for the IT department to solve this issue and a number of classes have had to do very little until this issue is solved. At 2pm I got sick of this and worked through a solution that gets teh account working, not to sure how much it stuffs up the system however, but hey, they are able to get in and work.
When it hangs... User press CTRL + ALT + DEL
User selects Logoff. This will then cause a error in the personalized settings dialog box and make it crash.
Then the user logs in and the personalized setting are applied again, this time working.
Now this works and has been emailed through... I really do hate showing up the IT department but it has to done sometimes.
Now one of the issues that the IT came back with is that the programs are now not appearing in the Start Menu, hello, we stated this back on the 18th September. Someone has managed to break the management console and it probably needs a damn good health check to fix it. Am awaiting this to see if it works, I asked for this back on the 18th September...
His solution is a windows profile fix, however we are on a managed network!!! This is what I am getting annoyed with, the management console will do most of the repairs, send him on some training for the managed network.
Contents of email.
Bug Report Program sets are not loading up on computers Microsoft Office has not been appearing for a while now, Now I have the Programming set not appearing
Also we have a Tui Ad competition at the moment. He has it running, yeah right. This realates to some CD Software we have within the school. The department has been waiting for months for this software to be installed and running, every time we see the IT technician, he says, yes I have it running. But we have to prove to him that it doesn't run. I got in contact with eth makers of the program and they say that they will send out the network capable version of teh program. So how can he get teh single machine copy running. You can't.
So to the IT Technication, get this man a Tui!
--- Email below ---
I was wondering if the school could pay for me to attend one of these first aid courses, it does meet a more specific need rather than the general first aid courses that have been on offer this year as I look after Mountain Biking, and it might be useful for me as the injures I have had this year are Mountain Bike specific (2 cracked ribs, a 3 inch gash on the left arm, and a fractured right shoulder).
14 October, $55 at Woodhill Forest, Hellensville.
I hope I get to go... three hours of training instead of 8 hours, sweet!
Well I get to go, early morning rise on Sunday morning, not too sure if I will take my bike though, still got a sore shoulder and haven't started physio yet on it.
Saturday, 6 October 2007
Just a comment on the ULearn Conference, it only seems to be in Auckland that people walk out of things before they have finished. I noticed this when I went to a warriors game last year that people walk out when they are losing, this happened also at the end keynote Tony Ryan sitting at the back near the door I noticed lots of people leaving during the keynote. Pity they missed a wonderful and thought provoking keynote speaker.
And I will be going back to school monday and asking why noone from school attended the conference, considering it was in Auckland. We are supposed to a be lead ICT School, and staff didn't attend. I don't think anyone from the ICTPD cluster went. I was lucky that I managed to get in as a presenter and also on someone elses ticket as they couldn't make the ther two days. Though I would like to see Ewans keynote address, I heard people rave about it for two days. The reason why I didn't ask to go was that I have been to an Navcon Conference before and also to TENZ conference earlier this year. Let someone else go. I will however be attending the one in Christchurch between the 8-10 October next year.
Friday, 5 October 2007
We are at the beginning,
Final Outcome, how will we know that the education system has succeeded?
Caring, capable, articulate, reflective, contributing, gracious citizens, answer from Year 8 Students.
Secondary school format, certain number of teaching spaces, certain number of teachers(specialist), certain number of students, certain number of curriculum areas. Subject packages. You get a monster thing of a tyrant of a timetable.
Core function of a school is learning.
What influences Learning?
13% of a students year is spent at school, taking in the hours each day.
Thinking Thursday, David Hargresly?
project must be at leat 6 months...
I will be honest, I fell asleep, too much drinking and a late night at the conference dinner last night.
Though I did wake up when he started talking about how teachers teach, and how teachers learn, there is a link between them
End Note Tony Ryan
Excuse spelling and grammar etc…live blogging this as I go….My notes…
Saying exact words - for this stage of the conference you’re looking sensational
What is a “Keynote”?
SOngline - series of songs and chants from Aboriginal culture? What is our global songline in education?.. Pathway to be inspiring in classrooms.
“Exercise your Goosebumps” in terms of inspiring our classrooms
What will I implement from this conference?
What 3 main comcepts/processes/ideas are you most likely to take further?
Will they measurably enhance your students’ learning?
Will they support your present great practises?
Can you pay respect to your Self while implementing them?
How to I put it into practise?
What could you do?
what will you do?
How and when will you do this?
HOw will you maintain??
Other follow up options
De-brief by next Wednesday - go back to my blogs and write a reflection of the conference and what I have got from it.
Build the conference material into your professional dialogue
Find a life coach - find someone who can challenge me to be the best I can be!!!
How can I stay inspired throughout this ongoing learning
Systems and schools; Classrooms; YOU
What is inspriation/: Enthusiasm, passion, purpose, spirit
Systems and Schools
Practise ‘abandonment’ - drop things that aren’t working
Understand that you ARE the system - one teacher can change to whole school for the positive or negative - we all count
Develop sustainable practises -
Create Green Light environments - red light vs green light thinking - I can do environments
Promote intellectual rigour
Be EXPLICIT - tick off the learning for the lesson with the kids
Help students to create solutions
Personally, locally and globally
Students Against Landmines, Schoolaid, global ideas bank
Second life, Third life, Fourth life
Who do you know who is truly inspiring?
Why is that person so inspiring?
What’s your score for ATTITUDE?
Maintain high energy levels
It’s not hard work
Fuel body so works as good as possible
Focus on the positive and meditative practises
Having depth, substance in life - give everything to life
Is it possible to be inspiring most (all) of the time?
Put a pen between your teeth and move your lips away from the pen so that they aren’t touching.
Young monk approaches the wise old monk…why do we have bto be celibate?,,,,two days later….It says celebrate……
Tell people the good things in life and education.
Be a mexican sky dancer…..
“Be the change you wish to see in the world”…Ghandi
Thursday, 4 October 2007
Maybe the future of computing in education,
The Intel Classmate
- Designed for education
- Durable rugged design for children's day-to-day use
- Small, kid friendly, form factor for classroom use
- Easy to carry and light-weight
- Education-specific features
- Integrated software and hardware solution
- Learning through fun, collaboration and interaction
- Easy to deploy
- IA-based, runs on already available content, applications and operating systems with full compatibility to standard PC ecosystem
First off an interesting presentation by Helen, Keynote speakers, using mind mapping software to present her presentation. Although there was nothing really new in it, it was a different way of presenting.
Next is a breakout for Space supporting Pedagogy.
factors that impact on teaching and learning, design features, trends, space, start with the students, not the building.
Students want to work with each other, online, in their time, in their place, doing things that matter, and to work with technology.
Learning styles, speed of change in the world, curriculum developments, changes to technology.
demand to cater for large number of learning modalities. Mostly design for lecture style and some individual.
Now we need to look at team collaboration, project based learning, story telling, independent study, peer tutoring.
Current spaces in classes/Boxes prevent sharing of best practice.
struggle to accommodate a range of learning configurations
cannot support different sized learning
not support efficient use of eLearning resources
Promote isolation, not collaboration.
Design features for the 21st century.
- Welcoming entry,
- Students Display Space, problems displaying digitial work?
- Home base and Indidivual Storage.
- Science Labs, Arts, etc.
- Music and performace
- Physical Fitness
- Casual eating Areas
- Transparency - Learning should be visible and Celebrated, High levels in visibility in formal and informal areas.
- Interior and Exterior Vistas
- Dispersed Technology, an integral part of our lives,
- Indoor - Outdoor connection
- Furniture - variety suitable for different learning spaces
- Flexible Spaces -
- Campire Spaces, space to learn from experts or story tellers, we need, rasised areas, moveabe seating...
- Waterhole spaces - area for students to gather
- Cave space, spaces for indivisual study, reflection...
- Design for Multiple Intelligences
- Daylight and Solar Energy
- Natural Ventilation
- Full Spectrum Lighting
- Sustainable Elements
- Local Signature
- Connected to Community, way it is to be designed to be a welcoming place...
- Learning Spaces
Space of the future
Flexible, visible, linked, cane be combined, display for traditional and digital work, real work spaces.
Learning Studios rather than classroom.
- Bringing it all together
Fat L Classroom, provides more opportunities, rearragne the classroom in such a way that you can provide individual learning opportunities.
Learning Street, maximise the use of space.
Furniture - flexible,
"The future doesn't exist, we create it"
Question to ask the principal...
What is in the school 5 year property plan, how does our department fit into this?
Ten Trends for 2007 Derek Wenmoth
Ten trends to watch for regarding the use of ICTs in the NZ education scene in 20071. Focus on networks and infrastructure
2. The role of ICTs in personalising learning
3. Focus on technical interoperability
4. The rise of ICTs in Early Childhood
5. ePortfolios – fad or future-focused?
6. The challenge of Cyber-bullying
7. The challenge of social networking software and informal learning
8. Educational use of Online Games and Simulations
9. Developing 21st Century Skills
10. Alternative approaches to managing and maintaining ICT systems
Networks and Infrastructure
The different levels of IT infrastructure
IP Level, (Internet)
Regional Loops (MUSH) - North Shore, Nelson
Advanced Networks, there is only one connection to the world advanced networks
Learning Management System
Student Management System
These need to coexist.
Content versus Presentation
exelearning (open source product) , see previous blog
you need to have a SCORM/IMS to be able to use some features. blackboard, moodle, interact
ICT in ECE
Early Childhood centres using ICT
ECE ICT Strategy
Digital Stories - Manaia Kindergarten Blog
Iris and the Microscope - photo story of a 15 month using a digital microscope
ePortfolios – fad or future-focused?
mahara Puts ePortfolio Owners in Contol
where does all the stuff you create get developed, these are now no longer created on written pages, it is moving towards a digital nature.
Storage repository, search able, tagged, private
The challenge of Cyber-bullying
The challenge of social networking software and informal learning
Struggling to stay focussed with this speaker, keeps going down tangents....
Educational use of Online Games and Simulations
- Claer Goals
- Problem Solving
Alice Carnegie Mellon university http://www.alice.org/
Developing 21st Century Skills
New curriculum development, inform yourself
Literacy Development - see the core ed page for teh link to teh book, might be good to add to the knowledgenet usergroup.
Alternative approaches to managing and maintaining ICT systems
Keynote Helen Baxter - Renaissance 2.0
Learning Pathways - clear pathways and steps so that you can map your own learning. Showed a Mind Meister of her own learning pathway.
Knowledge Mangaement - knowledge walking out in peoples heads…needed to make it available to all (early 90’s).
Provide pathways of potential but not clear cut any more.
Educating New Leonardos
Now is the time to move into the future. Need more creative thinkers…NZ is full of them. History of backyard tinkering - #8 wire tradition.
Coined by NY times journalist - concept of multi disciplinary studies.
NESTA UK - amazing projects coming from it.
Big attitude shift towards life long learning - not just our kids but also for ourselves because we don’t know what we need to now. Need to implant the joy of learning - playful, engaging. Need more auto-didacts (people who go and just learn what they want to learn when they want it).
Western vs Eastern learning philosophies - eastern = learning over earning….continue to learn gives the opportunity to earn over a longer time. Not deliverers but rather facilitators. “What have you learnt today?”
Need to bridge gap of the two generations - Let generation Y teach you.
What will the campuses f the futures look like? Googleplexes – hybrid of work and play.
NZ curriculum shift from what to How style from 2009 – Mary Chamberlain quote – no need for knowledge banks on legs…got computers for that…people got to get used to this!!!
Machines supporting us.
1. Learn how you learn
2. Core foundations
a. Context is important
b. Avoid early specialism
c. Theoritical, practical, social
3. Provide pathways to open source knowledge
a. Intellectual property is holding back invention and innovation in some areas – should be secondary to public good. Paten law being abused now (?)
4. Life ling learning – develop skills around needs and interests – why do I need to learn this..when will I ever use it? Teach where the knowledge is not what the knowledge is? Einstein had his ph number and address in suit pocket on paper as opposed to in his head
5. More Montessori styles and practises - google founders
6.Physical space and time
Teaching and using the same kind of practises they will be using in their future work environments. Centres for academic excellences being used in the UK – community centres for learning. Schools of ambition and design schools 2.0. Virtual Rome
TEDucation - technology, entertainment, design; ideas worth sharing. TED under 30’s Eva Verte = age 14 came up with a breakthrough in Alzheimers
Cafescribe -online text books. Open Wikis.
Screen generation taking in huge amounts of information being taking on board through the reading of online media.
Able to re-use media over and over - podacasts and blogs able to leave comments in the future.
Projects vs jobs - jobs for life not around anymore - even BBC has everyone on temp contracts. Shift of perspective.
Powersearching- how to find information quickly and efficient.
Gaming - is important - training for future careers eg Robot Surgeons. Strategy an teamwork.
Manage knowledge not the process
Self Publishing for $$
How do we educate our leonardos?
You cant but you can instill the right attitudes !!!!