128 views | +0 today
nursing education
Curated by anne macleod
Your new post is loading...
Your new post is loading...
Rescooped by anne macleod from Education Matters

The 6 C`s of Education for the 21st Century | Infogram, charts & infographics | eSkills

The 6 C`s of Education for the 21st Century | Infogram, charts & infographics | eSkills | edanne | Scoop.it


The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn and relearn.


Via Gust MEES, Roger Francis
Christiane Windhausen's curator insight, June 24, 2015 12:26 AM

6 wichtige Fähigkeiten, die es braucht, um gemeinsam zu lernen und gemeinsam zu wirklen.

Bibiana Vargas's curator insight, June 24, 2015 5:08 AM

A veces lo que creemos lejano no lo es tanto.  Con un poco de orden, estructura y algo de información podemos conformar un paisaje de cultura digital y ciudadana para ser usuarios del siglo XXI.  

Molly Frances Sheridan's curator insight, May 13, 8:38 PM

The Visual Article Infograph-

I like that it has different colors to separate the different sections/ideas and different pictures/stick figures doing differnet things. But I think some of the shorthand could be reworded and made more clear.

Rescooped by anne macleod from 21st Century Learning and Teaching

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | edanne | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .


Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...


The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

=> NOBODY is perfect! A security by 100% doesn’t exist! <=


Read more:



Via Gust MEES
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Rescooped by anne macleod from Training and Assessment Innovation

Top 10 Evidence Based Teaching Strategies

Top 10 Evidence Based Teaching Strategies | edanne | Scoop.it
Evidence based teaching strategies have a far larger effect on student results than others do. Discover the top ten, evidence based teaching strategies in this article.


Learn more:




Via Ines Bieler, Gust MEES, Jess Chalmers
Dr. Deborah Brennan's curator insight, May 22, 2015 2:58 PM

These strategies are the essential foundation of what all good teachers do.  Every article and book that I have read about school improvement and effective teaching seems for focus on these same strategies.  We know it...but do we do it?  WITH FIDELITY?  I think that is often where it breaks down. These strategies need to be a part of EVERY lesson...EVERY day. They become highly effective when they are implemented consistently and intentionally.  With all teachers are required to do, it is easy to lose focus on intentionally using these effective strategies.

Alfio Gangemi's curator insight, May 24, 2015 8:38 PM

This is probably the best resource I have found for a pre-service and graduate teacher. As the title says it outlines the top ten evidence based teaching strategies and clearly describes each strategy and how and why they are effective. Very useful resource!.

Steve Whitmore's curator insight, May 27, 2015 9:39 AM

Which of these strategies could you incorporate into your therapeutic groups?  How do you think they might be helpful? 


When you observe students in classrooms, do you see evidence of these practices?