Much of the debate about the mainstreaming of Web 2.0 tools in K-12 education here is in the United States centers on the challenges the kind of delivery of instruction required would face. That is, while we remain fairly rigid in how instruction is delivered and the idea of teacher-driven models, the use of Web 2.0 tools will always be marginalized.
In the sixth installment of their monthly column, blended learning experts Michael B. Horn and Heather Staker outline what teachers need to know about blended learning training resources, and where they can go to get them.
- By Michael Horn, Heather Staker
- 09/06/12
In "Crossing the Chasm," the high-tech marketing bible, G. Moore advises that If we want to convince mainstream educators to adopt mobile technologies, we need to (1) stop focusing on the technology per se (screen size, chip version, etc.), and (2) paint pictures of what goes on in the classroom when mobile technologies are used and what the kids will be like after using the mobile technologies. Here’s a crack at painting those pictures.
- By Cathie Norris, Elliot Soloway
- 03/04/13
In the fourth installment of their monthly column, blended learning experts Michael B. Horn and Heather Staker discuss the growth of open online resources and their impact on blended learning.
- By Michael Horn, Heather Staker
- 06/07/12
The spread of cheap and powerful videoconferencing tools had led to widespread adoption of the technology in an effort to lower costs and put resources to better use. But Education Consultant and Executive Director of Academic Programs and Faculty at Daymar Colleges Group Ruth Reynard argues that it can improve teaching and learning as well.
Over the last decade or so, numerous articles have appeared that conflate the ideas of a virtual science lab and a simulated science lab. For example, the College Board, in its guidelines, says, "A virtual lab is an interactive experience during which students observe and manipulate computer-generated objects, data, or phenomena in order to fulfill the learning objectives of a laboratory experience."
- By Harrison Keller
- 05/05/08
The emergence of open educational resources and the implications for learning
Students can have a range of physical, cognitive, sensory, and learning disabilities that affect their entire lives. Any of these might pose unique academic challenges, particularly when learning mathematics. The good news is that technology is removing barriers for the education of students with disabilities in regular classrooms. Unfortunately, not all software is based on principles of universal design.
While the technologies collectively known as Web 2.0 have penetrated the consumer sector rapidly over the last four years or so, the process has been much slower and more measured in education. There were some breakthroughs in 2007, with upward trends in the adoption--or at least availability--of Web 2.0 technologies in the areas of teacher professional development and supplemental instructional technologies, such as podcasting, streaming media, and blogging.
I began this three-part investigation on using biometrics in K-12 after reading The Truth about Biometric Devices in Schools. In part 1, I defined biometrics and indicated that they are creeping into nearly every market in our society, particularly since the tragedy of September 11. There are applications used in education to authenticate transactions; control entry into various facilities; monitor time and attendance; secure access to laptops, PCs, and networks; and more. I introduced you to the most commonly used biometrics in schools, which are fingerprints and handprints, provided resources for you to make your own investigation into the nature of those technologies and products available, and left you with concerns to think about. Now I'll delve more into those issues that have been raised by parents, students, and civil liberties groups. All of this is intended to help you better decide to ban its use or buy into biometrics. Stay with me, for in part 3 we'll look at vendor claims and a sound business plan of action that leads to a security solution you really need.
- By Patricia Deubel
- 04/25/07