An Eye on New Media
27.5K views | +0 today
An Eye on New Media
New Media in Society, Business & Classrooms
Curated by Ken Morrison
Your new post is loading...
Your new post is loading...
Scooped by Ken Morrison!

The 5 Stages of Building a Culture of Community on a Blog [Case Study] : @ProBlogger

The 5 Stages of Building a Culture of Community on a Blog [Case Study] : @ProBlogger | An Eye on New Media |
Yesterday we looked at some of the benefits and costs of building community on a blog - today I'd like ...
Ken Morrison's insight:

ProBlogger's Darren Rowse analyzes how to build a community around a blog.  He has build communities for both ProBlogger and Digital Photography School

No comment yet.
Rescooped by Ken Morrison from Just Story It! Biz Storytelling!

Visual Storytelling: The Ultimate Guide to Creating Appealing Content

From videos to infographics, I’m constantly leveraging visual media. Can you guess why? It’s because these visual content pieces are generating more backlinks …

Via Karen Dietz
Karen Dietz's curator insight, April 20, 2015 5:40 PM

Go grab this infographic -- it's really great!

Not only does it give you stats on the necessity for visual content/storytelling, but it lists 4 top tools. 

Even better, scroll down for 3 fab design tips that I haven't run across before - but they make perfect sense.

Story on!

Comwyn's curator insight, April 21, 2015 8:01 AM

Nice article on adding engaging and appealing content.

Debra Walker's curator insight, April 22, 2015 2:00 PM

your visual brand is becoming even more fundamental to marketing strategies.

Scooped by Ken Morrison!

How to Break Out of a Creative Rut - Copyblogger

How to Break Out of a Creative Rut - Copyblogger | An Eye on New Media |
Ideas for unleashing your creativity when you find yourself in a creative rut ...
Ken Morrison's insight:

I am sharing this for two reason. Yes, the info graphic is great.  Many people share tips that they hope will magically make people creative. I like how this source tells us what stifles creativity.  Also, Brian Clark of Copyblogger is simply a wonderful professional who communication experts should follow.

No comment yet.
Scooped by Ken Morrison!

The Real Social Networking Battle: Isolated vs Integrated - Datamation

The Real Social Networking Battle: Isolated vs Integrated - Datamation | An Eye on New Media |

If you don't understand why the Tumblr aquisition is a big deal, these two pages will help you understand the historical and societal context.

Ken Morrison's insight:

My favorite part of this short piece is on the second page when it talk's about 'improving' Tumblr and that many users will not want it to be 'improved'  They found and stayed at Tumblr because it is different.  They don't want semantic search. They don't want an audience.  They want to share their ideas and their art. They don't want to be scaled.

No comment yet.
Rescooped by Ken Morrison from Digital Delights!

Exploring students’ understanding of how blogs and blogging can support distance learning in Higher Education

Exploring students’ understanding of how blogs and blogging can support distance learning in Higher Education | An Eye on New Media |
Fig.1. Why Blog? If anything has been written on blogging I want to read it. On 27th September 1999 I posted to my first blog - it was on blogging and new media. We're now in the phase of transitio...

Via Ana Cristina Pratas
Louise Robinson-Lay's curator insight, March 1, 2013 5:24 AM


Debbie Elicksen 's curator insight, March 1, 2013 10:05 AM

Realize that students may not consider blogging because they don't know anything about it. This stuff is not taught in most North American schools. I recall speaking to a group of grade 12s and someone asked me what a blog was.

Vance Stevens's curator insight, March 2, 2013 8:22 AM

As if we had to support why blogging is important to students ... well, of course we do, and if you are in the position of reaching into your quivver for the arrow that will hit the target, this one has it all, a research base and a wow graphic. Run this by your curriculum coordinator :-)

Scooped by Ken Morrison!

Michael Hyatt | Intentional Leadership

Michael Hyatt | Intentional Leadership | An Eye on New Media |
Michael Hyatt’s thoughts on leading with purpose, personal productivity, book publishing, and social media.
Ken Morrison's insight:

Through much of the third quarter of 2012, I kept hearing the nam of Micahel Hyatt repeated by my favorite podcasters and authors.  I have been subscribing and reading his email newsletter since October.  I am impressed with his ideas and action.

REwebCentral's comment, January 7, 2013 10:04 PM
I'm a huge Michael Hyatt fan, too, Ken! Good stuff!
Barbara Kurts's comment, January 9, 2013 9:05 PM
my topics here
Scooped by Ken Morrison!

A 60 Seconds Guide to The Use of Blogging in Education

A 60 Seconds Guide to The Use of Blogging in Education | An Eye on New Media |
Click here to edit the content...
Ken Morrison's insight:

Ken's Key Takeaway:

I love the insight in the commenting section.  Comments are not just about the original content.  Blog posts become living social objects that continue to spur multi-way conversation and grwoth.


No comment yet.
Rescooped by Ken Morrison from EFL- ESL BLOGS WORTH FOLLOWING!

Education Rethink

Education Rethink | An Eye on New Media |

Ken's Key Takeaway:

This is a nice article with tips on how to get students blogging and how to manage the process and privacy.

Via Roselink
Ken Morrison's comment, September 11, 2012 7:50 AM
This guy is becoming popular. Thank you for sharing.
Rescooped by Ken Morrison from Cibereducação!

10 Types Of Writing For eLearning: The eLearning Coach: Instructional Design and eLearning

10 Types Of Writing For eLearning: The eLearning Coach: Instructional Design and eLearning | An Eye on New Media |

Not only do we need skills for expository, creative, persuasive and technical writing, but we often write about topics for which we know very little at first. Furthermore, our writing is expected to be motivating while clearly delivering concepts, procedures and facts.
Here you’ll find some brief guidelines that focus on each type of writing. Much of this writing is done in storyboards, so I didn’t include writing for storyboards as a separate type. What other types of writing for eLearning can you think of?

Via Alfredo Calderón, Luciana Viter
Louise Robinson-Lay's comment, August 17, 2012 8:42 AM
Thanks Ken, I'm glad you find it useful. Please feel free to recommend good sites.
Ken Morrison's comment, August 26, 2012 10:01 AM
Thank you for the rescoop!
I see great resources on your site.
Ken Morrison's comment, August 27, 2012 12:21 PM
Thank you for the rescoop. I like what I see on your topic!
Scooped by Ken Morrison!

22 Top Blogging Tools Loved by the Pros | Social Media Examiner

22 Top Blogging Tools Loved by the Pros | Social Media Examiner | An Eye on New Media |

This is a great collection!  My favortie new tool is #16 Photo Pin.  I also like #6 Focus Booster


Blogging tools: Here are hot blogging tools used today by 22 social media pros.

No comment yet.
Scooped by Ken Morrison!

The 25 Basic Styles of Blogging ... And When To Use Each One

This is both a great primer and a great reminder for bloggers


A compilation of 25 basic styles of blogging from award winning blogger and author of Personality Not Included, Rohit Bhargava.

No comment yet.
Scooped by Ken Morrison!

Content is King… or Is It?

Content is King… or Is It? | An Eye on New Media |

I like this guys writing style and his advice.  My main takeaway is that on the web, creativity can be confusing. Specifically, titles should be clear in a world where everyone makes a judgement in 2 seconds if they will read or not.  I'm not convinced, but I am willing to challenge my thoughts.

No comment yet.
Scooped by Ken Morrison!

The Final Countdown for 1000 Awesome Things

The Final Countdown for 1000 Awesome Things | An Eye on New Media |

1000 Awesome Things will be ending soon. This blog began during a tough time for a man who refused to focus on the negative things in life.


No comment yet.
Scooped by Ken Morrison!

What Meaningful Reflection On Student Work Can Do for Learning

What Meaningful Reflection On Student Work Can Do for Learning | An Eye on New Media |
Reflecting on one's work can be instrumental to growth and improvement, but it's an activity that's often under utilized.
Ken Morrison's insight:

Wise use of Mmeaningful reflective learning practices should be:

Applicable &


No comment yet.
Scooped by Ken Morrison!

Crowdsourced School Social Media Policy Now Available | Edudemic

Crowdsourced School Social Media Policy Now Available | Edudemic | An Eye on New Media |
I’ve been seeing a lot of people on social media looking for a social media policy and / or an acceptable use policy. So I offered to help spearhead an initiative where some of our amazing readers could help craft these policies from scratch. It started out very basic but, 400 edits later, has materialized into a thoughtful and well-organized document that’s a great template for any school. It may not be perfect for you, but use this as a jumping-off point to get your own policy started.

The School Social Media & Acceptable Use Policy
Social Media
Responsible Use Guidelines

We encourage teachers, students, staff, and other school community members to use social networking/media (Twitter, Facebook, etc.) as a way to connect with others, share educational resources, create and curate educational content, and enhance the classroom experience. While social networking is fun and valuable, there are some risks you should keep in mind when using these tools. In the social media world, the lines are blurred between what is public or private, personal or professional.

We’ve created these social networking/media guidelines for you to follow when representing the school in the virtual world.

Please do the following:

Use good judgment

We expect you to use good judgment in all situations.
You must know and follow the school’s Code of Conduct and Privacy Policy.
Regardless of your privacy settings, assume that all of the information you have shared on your social network is public information.
Be respectful

Always treat others in a respectful, positive and considerate manner.
Be responsible and ethical

Even though you are approved to represent the school, unless you are specifically authorized to speak on behalf of the school as a spokesperson, you should state that the views expressed in your postings, etc. are your own. Stick with discussing school-related matters that are within your area of responsibility.
Be open about your affiliation with the school and the role/position you hold.
Be a good listener

Keep in mind that one of the biggest benefits of social media is that it gives others another way to talk to you, ask questions directly and to share feedback.
Be responsive others when conversing online. Provide answers, thank people for their comments, and ask for further feedback, etc.
Always be doing at least as much listening and responding as you do “talking.”
Don’t share the following:

Confidential information

Do not publish, post or release information that is considered confidential or not public. If it seems confidential, it probably is. Online “conversations” are never private. Do not use your birth date, address, and cell phone number on any public website.
Private and personal information

To ensure your safety, be careful about the type and amount of personal information you provide. Avoid talking about personal schedules or situations.
NEVER give out or transmit personal information of students, parents, or co-workers
Don’t take information you may receive through social networking (such as e-mail addresses, customer names or telephone numbers) and assume it’s the most up-to-date or correct.
Always respect the privacy of the school community members.
Please be cautious with respect to:


Respect brand, trademark, copyright information and/or images of the school (if applicable).
You may use photos and video (products, etc.) that are available on the school’s website.
It is generally not acceptable to post pictures of students without the expressed written consent of their parents.
Do not post pictures of others (co-workers, etc.) without their permission.
Other sites

A significant part of the interaction on blogs, Twitter, Facebook and other social networks involves passing on interesting content or linking to helpful resources. However, the school is ultimately responsible for any content that is shared. Don’t blindly repost a link without looking at the content first.
Pay attention to the security warnings that pop up on your computer before clicking on unfamiliar links. They actually serve a purpose and protect you and the school.
When using Twitter, Facebook and other tools, be sure to follow their printed terms and conditions.
And if you don’t get it right…

Be sure to correct any mistake you make immediately, and make it clear what you’ve done to fix it.
Apologize for the mistake if the situation warrants it.
If it’s a MAJOR mistake (e.g., exposing private information or reporting confidential information), please let someone know immediately so the school can take the proper steps to help minimize the impact it may have.

Social Media
Acceptable Use Policy

YOURSCHOOLNAME recognizes that access to technology in school gives students and teachers greater opportunities to learn, engage, communicate, and develop skills that will prepare them for work, life, and citizenship. We are committed to helping students develop 21st-century technology and communication skills.

To that end, we provide access to technologies for student and staff use. This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned devices on the school campus.

The network is intended for educational purposes.
All activity over the network or using district technologies may be monitored and retained.
Access to online content via the network may be restricted in accordance with our policies and federal regulations, such as the Children’s Internet Protection Act (CIPA).
Students are expected to follow the same rules for good behavior and respectful conduct online as offline.
Misuse of school resources can result in disciplinary action.
We make a reasonable effort to ensure students’ safety and security online, but will not be held accountable for any harm or damages that result from misuse of school technologies.
Users of the network or other technologies are expected to alert IT staff immediately of any concerns for safety or security.
Technologies Covered
YOURSCHOOLNAME may provide Internet access, desktop computers, mobile computers or devices, videoconferencing capabilities, online collaboration capabilities, message boards, email, and more.

As new technologies emerge, YOURSCHOOLNAME will attempt to provide access to them. The policies outlined in this document are intended to cover all available technologies, not just those specifically listed.

Usage Policies
All technologies provided by YOURSCHOOLNAME are intended for educational purposes. All users are expected to use good judgment and to follow the specifics of this document as well as the spirit of it: be safe, appropriate, careful and kind; don’t try to get around technological protection measures; use good common sense; and ask if you don’t know.

Web Access
YOURSCHOOLNAME provides its users with access to the Internet, including web sites, resources, content, and online tools. That access will be restricted in compliance with CIPA regulations and school policies. Web browsing may be monitored and web activity records may be retained indefinitely.

Users are expected to respect that the web filter is a safety precaution, and should not try to circumvent it when browsing the Web. If a site is blocked and a user believes it shouldn’t be, the user should follow protocol to alert an IT staff member or submit the site for review.

YOURSCHOOLNAME may provide users with email accounts for the purpose of school-related communication. Availability and use may be restricted based on school policies.

If users are provided with email accounts, they should be used with care. Users should not send personal information; should not attempt to open files or follow links from unknown or untrusted origin; should use appropriate language; and should only communicate with other people as allowed by the district policy or the teacher.

Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Email usage may be monitored and archived.

Social / Web 2.0 / Collaborative Content
Recognizing that collaboration is essential to education, YOURSCHOOLNAME may provide users with access to web sites or tools that allow communication, collaboration, sharing, and messaging among users.

Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Posts, chats, sharing, and messaging may be monitored. Users should be careful not to share personally-identifying information online.

Mobile Devices Policy
YOURSCHOOLNAME may provide users with mobile computers or other devices to promote learning both inside and outside of the classroom. Users should abide by the same acceptable use policies when using school devices off the school network as on the school network.

Users are expected to treat these devices with extreme care and caution; these are expensive devices that the school is entrusting to your care. Users should report any loss, damage, or malfunction to IT staff immediately. Users may be financially accountable for any damage resulting from negligence or misuse.

Use of school-issued mobile devices, including use of the school network, may be monitored.

Personally-Owned Devices
Students may use personally-owned devices (including laptops, tablets, smartphones, and cell phones) at any time during school hours—unless such use interferes with the delivery of instruction by a teacher or staff or creates a disturbance in the educational environment.  Any misuse of personally-owned devices may result in disciplinary action.  Therefore, proper netiquette and adherence to the acceptable use policy should always be used.  In some cases, a separate network may be provided for personally-owned devices.

Users are expected to take reasonable safeguards against the transmission of security threats over the school network. This includes not opening or distributing infected files or programs and not opening files or programs of unknown or untrusted origin. If you believe a computer or mobile device you are using might be infected with a virus, please alert IT. Do not attempt to remove the virus yourself or download any programs to help remove the virus.

Users should not download or attempt to download or run .exe programs over the school network or onto school resources without express permission from IT staff. You may be able to download other file types, such as images of videos. For the security of our network, download such files only from reputable sites, and only for educational purposes.


Users should always use the Internet, network resources, and online sites in a courteous and respectful manner.
Users should also recognize that among the valuable content online is unverified, incorrect, or inappropriate content. Users should use trusted sources when conducting research via the Internet.
Users should also remember not to post anything online that they wouldn’t want parents, teachers, or future colleges or employers to see. Once something is online, it’s out there—and can sometimes be shared and spread in ways you never intended.

Users should not plagiarize (or use as their own, without citing the original creator) content, including words or images, from the Internet.
Users should not take credit for things they didn’t create themselves, or misrepresent themselves as an author or creator of something found online. Research conducted via the Internet should be appropriately cited, giving credit to the original author.
Personal Safety
If you see a message, comment, image, or anything else online that makes you concerned for your personal safety, bring it to the attention of an adult (teacher or staff if you’re at school; parent if you’re using the device at home) immediately.

Users should never share personal information, including phone number, address, social security number, birthday, or financial information, over the Internet without adult permission.
Users should recognize that communicating over the Internet brings anonymity and associated risks, and should carefully safeguard the personal information of themselves and others.
Users should never agree to meet someone they meet online in real life without parental permission.
Cyberbullying will not be tolerated. Harassing, dissing, flaming, denigrating, impersonating, outing, tricking, excluding, and cyberstalking are all examples of cyberbullying. Don’t be mean. Don’t send emails or post comments with the intent of scaring, hurting, or intimidating someone else.
Engaging in these behaviors, or any online activities intended to harm (physically or emotionally) another person, will result in severe disciplinary action and loss of privileges. In some cases, cyberbullying can be a crime. Remember that your activities are monitored and retained.

Examples of Acceptable Use
I will:

Use school technologies for school-related activities and research.
Follow the same guidelines for respectful, responsible behavior online that I am expected to follow offline.
Treat school resources carefully, and alert staff if there is any problem with their operation.
Encourage positive, constructive discussion if allowed to use communicative or collaborative technologies.
Alert a teacher or other staff member if I see threatening/bullying, inappropriate, or harmful content (images, messages, posts) online.
Use school technologies at appropriate times, in approved places, for educational pursuits only.
Cite sources when using online sites and resources for research; ensure there is no copyright infringement.
Recognize that use of school technologies is a privilege and treat it as such.
Be cautious to protect the safety of myself and others.
Help to protect the security of school resources.
This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies.

Examples of Unacceptable Use
I will not:

Use school technologies in a way that could be personally or physically harmful to myself or others.
Search inappropriate images or content.
Engage in cyberbullying, harassment, or disrespectful conduct toward others–staff or students.
Try to find ways to circumvent the school’s safety measures and filtering tools.
Use school technologies to send spam or chain mail.
Plagiarize content I find online.
Post personally-identifying information, about myself or others.
Agree to meet someone I meet online in real life.
Use language online that would be unacceptable in the classroom.
Use school technologies for illegal activities or to pursue information on such activities.
Attempt to hack or access sites, servers, accounts, or content that isn’t intended for my use.
This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies.

Limitation of Liability
YOURSCHOOLNAME will not be responsible for damage or harm to persons, files, data, or hardware. While YOURSCHOOLNAME employs filtering and other safety and security mechanisms, and attempts to ensure their proper function, it makes no guarantees as to their effectiveness. YOURSCHOOLNAME will not be responsible, financially or otherwise, for unauthorized transactions conducted over the school network.

Violations of this Acceptable Use Policy
Violations of this policy may have disciplinary repercussions, including:

Suspension of network, technology, or computer privileges in extreme cases
Notification to parents in most cases
Detention or suspension from school and school-related activities
Legal action and/or prosecution
I have read and understood this Acceptable Use Policy and agree to abide by it:

(Student Printed Name)
Ken Morrison's insight:

Does your school have a social media policy for educators and support staff?  If not, here is a nice starter kit.

Other resources on the topic include:

One school's policy:

Northwestern University's policy:


No comment yet.
Scooped by Ken Morrison!

Launch a Self-Hosted WordPress Blog in 20 Minutes or Less

Launch a Self-Hosted WordPress Blog in 20 Minutes or Less | An Eye on New Media |
The easiest way to build a platform in today’s world is to start a blog. While you can do this with free hosted options like,, and, you will get the most control by using self-hosted WordPress. This is what most serious bloggers use. It is what I use here at However, […]
Ken Morrison's insight:

MIchael Hyatt has helped more than 6,000 people set up their blog in less than 20 minutes with this tutorial.

No comment yet.
Scooped by Ken Morrison!

David Karp’s Dilemma | TechCrunch

David Karp’s Dilemma | TechCrunch | An Eye on New Media |

Tumblr founder David Karp is probably having a very interesting weekend as he decides if he should cash in on a Yahoo deal or hold out for more money or continued control

Ken Morrison's insight:

Well Done David Karp. He built a platform that took blogging to a new segment of society.  My key takeaway is this quote from the article:
 "Can Karp put on the big-boy pants, hire a Sheryl Sandberg character, and create a money-making machine? Because if he’s not sure, and he’s not ready for a long, hard, uphill fight, he should sell."

No comment yet.
Rescooped by Ken Morrison from SOCIAL MEDIA, what we think about!!

How to Setup a Wordpress Blog in 5 Minutes

How to Setup a Wordpress Blog in 5 Minutes | An Eye on New Media |

I started my blog using WordPress and I have found it a platform that makes it easy to own and publish your own content online.


It is the foundation to the success of this blog which currently receives over 300,000 hits per month.


If you’re looking for an easy way to create a web presence and start sharing your ideas online, the best way to do this is to create a blog. Millions of users around the world already express themselves and share their thoughts by means of their personal blogs.


The advantage of having your own WordPress blog that is self-hosted is that you own it.


It is good to have a Facebook “page” or a Tumblr blog but they are owned by someone else and you can have a web presence there but under their “Terms and Conditions” It is basically a rental.


Via Martin Gysler
Ken Morrison's insight:

As Jeff Bulas mentions, one of the huge advantages of having a wordpress blog is that you host and own the information.  You can also create ways to collect data on who visits your site.

Alfredo Corell's curator insight, February 10, 2013 7:22 AM

Brilliant step-to-step simple summary. I'm thinking in starting a Wordpress Blog more easyly now. Thanks!!!

Paul's curator insight, February 11, 2013 10:04 AM

I love word press and we use it for our school blog  ;

dakinane's curator insight, February 27, 2013 5:17 PM

Both org and .com variants of Wordpress are a delight to use, I have sued them for years, had to abandon my hosted Wordpress blog when I upgraded my website.  I miss it.

Scooped by Ken Morrison!

Whatcha Gonna Do With That Duck?

Whatcha Gonna Do With That Duck? | An Eye on New Media |
Plus unboxing videos and links to my new collection, Whatcha Gonna Do. It's not clear that the most trafficked posts are my best posts, but it's a fine place to start.
Ken Morrison's insight:

Seth Godin has released a list of his top blog post of 2012.  I am so thankful that this man has provided short tips for me to improve my careeer, my production, and my outlook for the past four years.  He is a great example of doing something every day to build something big.  His ideas are very relavent both for marketers and those building a social media presence.

Martin (Marty) Smith's curator insight, December 31, 2012 11:27 AM

Seth understands brevity and great headlines. Takes no time to "read" these posts all of which are informative and fun. Read my story of spending a day with Seth here:

Working With Seth Godin 

Scooped by Ken Morrison!

9 Elements of the Perfect Post : @ProBlogger

9 Elements of the Perfect Post : @ProBlogger | An Eye on New Media |

ProBlogger brought in Ginny Soskey of Shareaholic as a guest blogger.. She talks about how to make the perfect blog (in Google's eyes and in your users' eyes.  The trend I keep hearing lately, is to make them scannable.  We are all busy and most of us scan before deciding if they want to dig in.  Perhaps that is why Seth Godin is so successful.


Ken Morrison's comment, September 16, 2012 9:27 AM
HI Paula
Thank you for the rescoop.
Scooped by Ken Morrison!

Michael Stelzner | Social Media Examiner

Michael Stelzner | Social Media Examiner | An Eye on New Media |

This morning in one very short bike ride, I was able to learn many great tips from two industry giants Michael Stelzner and Brian Solis.  I love this aspect of my life.  Podcasts have changed my learning in so many ways.


Ken's Key Take-Away:

All blogs should:
1) Have a headline that makes people interested and want to learn more

2) Be Skimmable and Scannable.


In the first few moments, Brian Solis will tell you specifically how he teaches people how to improve their blog traffic.


No comment yet.
Rescooped by Ken Morrison from Content Curation World!

Content Curation: How To Cite, Credit and Attribute Other People's Content on the Web

Content Curation: How To Cite, Credit and Attribute Other People's Content on the Web | An Eye on New Media |

Robin Good: Here is a good guide providing the basic principles that should be followed when using, reposting, citing or quoting other people's content (both text and images).


The article outlines "proper methods of source attribution on the internet to guarantee the right people get credit for their hard work and ideas."


Specific sections of the article cover:

How To Cite Content in Blog Posts How To Cite Content in Social Media How to Give Credit to Guest Bloggers and Ghost Writers How to Cite Images and Visual Content



Well done. 8/10

Read more:




Via Robin Good
El código Gutenberg's comment, August 18, 2012 2:01 PM
Thank you very much. You're very kind. I hope that readers like my work in "El código Gutenberg". And thank you for the information in your page.
nickcarman's curator insight, February 17, 2013 5:45 PM

This is an excellent article, which lays out the groundrules for using, or citing someone else's content.

Nevermore Sithole's curator insight, August 29, 2013 8:32 AM

A Good Resource

Scooped by Ken Morrison!

The Best Ways To Use Photos In Lessons | Larry Ferlazzo’s Websites of the Day…

The Best Ways To Use Photos In Lessons | Larry Ferlazzo’s Websites of the Day… | An Eye on New Media |

For the life of me, I can never remember this guy's name, nor the spelling of it when I do remember it.  But he consistently pops onto my radar with amazing content that comes highly recommended from people who I respect.  great stuff every time..  This post focuses on the use of images when teaching.

No comment yet.
Scooped by Ken Morrison!

UPDATED: Scottish town council shuts down 9-y-o girl's wildly popular school lunch blog

UPDATED: Scottish town council shuts down 9-y-o girl's wildly popular school lunch blog | An Eye on New Media |

Here is a disgusting decision to shut down a 9-year-old's successful blog that made people think about nutrician.  Thankfully, the school reveresed it's decidison.  A nine-year-old girl in Scotland has been ordered to abandon NeverSeconds, her wildly popular blog, which features photos and commentary of the food served in her school.

No comment yet.
Rescooped by Ken Morrison from business analyst!

The 2012 Fortune 500 Social Media Statistics

The 2012 Fortune 500 Social Media Statistics | An Eye on New Media |

Thank You Michel Verstrepen for sharing this infographic.

I am surprised that there is still 40% of Fortune 500 companies that don't have a blog, 40% that don't have a Facebook Page, and 40% that don't have a Twitter account.

See other great scoops at:

Via Rami Kantari, michel verstrepen
No comment yet.