Wepyirang
Follow
Find tag "Government"
2.7K views | +0 today
Wepyirang
Web life/Real-time Social Web
Curated by Jimun Gimm
Your new post is loading...
Your new post is loading...
Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

What’s Our Vision for the Future of Learning?

What’s Our Vision for the Future of Learning? | Wepyirang | Scoop.it
Author David Price writes: "If schools are coming into direct competition with the learning opportunities available in the informal social space, it has to be said that this is a pressure, which barely registers within the political discourse.

 

In the following pages, Price describes three cases across the globe — in London, Sydney, San Diego — that have mapped a vision that answers the questions above. Here’s what they have in common:

 

- By insisting that their teachers and mentors share their learning, all three have de-privatized teaching and learning.

 

- By opening up the commons, and by designing workspaces without walls, they have brought Edison’s ‘machine-shop culture’ into education.

 

- By bringing into the commons, experts, parents and investors, they have given an authenticity to the work of their students that is impossible to simulate in an enclosed classroom.

 

- By modelling collaborative working to their students they have fostered the peer learning which is at the heart of ‘open’.

 

- By emphasizing adult and real-world connections, they ensure that students are preparing for the world beyond school by being in that world.

 

- By making their expertise and intellectual property freely available, they have created high demand from their peers and ensured that knowledge travels fast.

 

- By seeing technology not simply as an aide to learning but as the imperative for change, they ensure that their programs are relevant to societal needs and societal shifts.

 

- By trusting in their staff and students, and by giving them freedom and responsibility in equal measure, they have fostered a culture of learning that rewards respectful challenge, shuns unnecessary deference, and therefore constantly stays in motion.

 


Via Gust MEES
more...
Carol Rine's curator insight, January 3, 8:59 AM
Wondering what is on the horizon for education.... Significant upheaval, hacking our own learning, and the ability by our students to learn by....
compiling their own learning playlist, putting together units of study that appeal to their passions, (and) the one-size-fits-all model of high school will appear alarmingly anachronistic... Great quote by the Singapore Minister of Eduction -- “The educational paradigm of our parents’ generation, which emphasized the transmission of knowledge, is quickly being overtaken by a very different paradigm. This new concept of educational success focuses on the nurturing of key skills and competencies such as the ability to seek, to curate and to synthesize information; to create and innovate; to work in diverse cross-cultural teams; as well as to appreciate global issues within the local context.”
María Dolores Díaz Noguera's curator insight, January 14, 1:46 AM

Very nice sharing. Thanks

Ivon Prefontaine's curator insight, January 14, 10:43 AM

Sometimes what is most obvious is what we do not see readily. Whitehead suggested this was the case, but other, including the Buddha and Jesus, said similar things. We need to examine what we are doing, be aware of what we want from education. This takes leadership that moves away from easy, facile ways of doing things with 7 habits, 4 methods, etc. and makes real and meaningful change.

 

We simply cannot continue to add more changes without removing some of the architecture that currently exists. This includes with technology.

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

Are We in an An Age of Collective Learning?

Are We in an An Age of Collective Learning? | Wepyirang | Scoop.it
Rotana Ty shares a wonderful essay on collective learning for Permamarks blog. He has curated ideas by many thought leaders on the topic including Marcia Conner, Nilofer Merchant, John Hagel, Tiffany Shlain, Gideon Rosenblatt, J.

Via Gust MEES
more...
The Rice Process's curator insight, November 25, 2013 1:27 PM

experts and expertise exists beyond the traditional classroom.

John Rudkin's curator insight, November 28, 2013 4:45 AM

Really wonderful info.

Pippa Davies @PippaDavies 's curator insight, December 15, 2013 7:53 PM

Connected learning is 21 century learning and gives shared purpose and creates community.

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

Don't Use Any Of These 20 Popular Passwords [Infographic]

Don't Use Any Of These 20 Popular Passwords [Infographic] | Wepyirang | Scoop.it
What are some of the world's most popular passwords? If you're thinking your 123456 password is foolproof, you better think again.

Via Gust MEES
more...
Gust MEES's curator insight, April 23, 2013 1:03 PM

 

55% of net users use the same password for most, if not all, websites. When will they learn?

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

 

Gust MEES's curator insight, April 23, 2013 1:06 PM

55% of net users use the same password for most, if not all, websites. When will they learn?

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

Rescooped by Jimun Gimm from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | Wepyirang | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, March 4, 2013 8:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 12:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 1:39 AM
Thanks all
Rescooped by Jimun Gimm from La "Réalité Augmentée" (Augmented Reality [AR])
Scoop.it!

Unintended, malicious and evil applications of augmented reality

Unintended, malicious and evil applications of augmented reality | Wepyirang | Scoop.it

Products have substantial flaws, technology designers seek ways to extract money from users, and many users twist well intentioned technology in ways the designers never expected, often involving baser instincts. These realities should come as no surprise to security professionals who are usually most effective when assuming the worst in people. One sure to be abused emerging technology is augmented reality.

 

Augmented reality technologies overlay computer generated data on a live view of the real world. Anticipated application domains include entertainment, travel, education, collaboration, and law enforcement, among numerous others.

 


Via Gust MEES
more...
Gust MEES's curator insight, February 12, 2013 7:11 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

 

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 7:17 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 7:18 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

QR Code Security [pdf]

A MUST read!!!

 


Via Gust MEES
more...
Rescooped by Jimun Gimm from 21st Century Teaching & Learning Resources
Scoop.it!

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware | Wepyirang | Scoop.it
Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The bug, which can be used to gai...
Here's what the researchers found they could access:

TV settings and channel lists
SecureStorage accounts
Widgets and their configurations
History of USB movies
ID
Firmware
Whole partitions
USB drives attached to the TV


Gust MEES's insight:

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable! Protect YOUR computer(s) and Smartphone(s):

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

Via Gust MEES, Linda Buckmaster
more...
Gust MEES's curator insight, December 12, 2012 1:00 PM

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable!

 

Protect YOUR computer(s) and Smartphone(s):

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Linda Buckmaster's curator insight, December 16, 2012 10:11 PM

I have just purchased a new Samsung TV and had no idea of the potential dangers ... thanks for info GM!

Thybo Lingier's curator insight, December 31, 2013 6:51 AM

Company name: Samsung
Economic activity segment: Technology

Use of ICT: New technolgy combined with the internet and several other options. For example connecting your television with Facebook or Youtube

Objectives: Customer Satisfaction and Innovation

Rescooped by Jimun Gimm from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Digital Universe - Insafe

Digital Universe - Insafe | Wepyirang | Scoop.it

European Schoolnet (host organisation of Insafe), together with Liberty Global, has today launched an animation aimed at educating parents on children's safety online: The Digital Universe of Your Children. View it here…

Gust MEES's insight:

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century! Check out also my FREE courses:

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

=============> BE AWARE OF THE MALWARE <============


Via Gust MEES
more...
Gust MEES's curator insight, December 13, 2012 6:05 AM

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century!

 

Check out also my FREE courses:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

                ===> BE AWARE OF THE MALWARE <===

 

 

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

Why Learning Through Social Networks Is The Future

Why Learning Through Social Networks Is The Future | Wepyirang | Scoop.it

Students Need Professional Learning Networks, Too

Learning to create, manage and promote a professional learning network (PLN) will soon become, if it’s not already, one of the most necessary and sought after skills for a global citizen, and as such, must become a prominent feature of any school curriculum.

 


Via Gust MEES
more...
Ali Anani's curator insight, December 1, 2013 9:52 PM

The emergence of social networks impact is well-explained in this post.

Amanda Feliu's curator insight, December 2, 2013 1:55 AM

Un article molt interessant que parla sobre que els estudiants necessiten aprendre des de xarxes socials professionals.

Kim Flintoff's curator insight, July 7, 10:27 PM

Collaboration can be both a formal structure for learning activity but also an underpinning framework for engagement and fostering life-long learning.  Learning networks are part the new learning ecosystem and should be recognised and supported.

Rescooped by Jimun Gimm from ICT Security Tools
Scoop.it!

Tenable Network Security

Tenable Network Security | Wepyirang | Scoop.it

SecurityCenterContinuous View

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Learn more about integrated risk, threat, and compliance analytics for security analysts, compliance auditors, and executive risk managers.

 


Via Gust MEES
more...
Gust MEES's curator insight, July 11, 2013 10:31 PM

 

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Rescooped by Jimun Gimm from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

How to Protect Your WordPress From Attack

How to Protect Your WordPress From Attack | Wepyirang | Scoop.it
An ongoing brute-force attack on WordPress-based websites has compromised more than 90,000 blogs, but there are simple ways to make sure your blog won't be next to fall.

Via Gust MEES
more...
Rescooped by Jimun Gimm from Social Media and its influence
Scoop.it!

[Infographic] Top Scams on Facebook

[Infographic] Top Scams on Facebook | Wepyirang | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 2, 2013 12:45 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, March 2, 2013 12:46 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Randi Thompson's curator insight, March 3, 2013 1:55 PM

Top Facebook scams to be aware of

Rescooped by Jimun Gimm from QR-Code and its applications
Scoop.it!

QR codes, smartphones et sécurité

QR codes, smartphones et sécurité | Wepyirang | Scoop.it

Les "QR codes" fleurissent depuis quelques années dans tous les environnements : presse, lieux publics, pages web, boîtes d'emballages... mais savez-vous vraiment si leur utilisation est sécurisée ? Que risquez-vous en utilisant ces mystérieux dessins noir & blanc ?


Via Jean-Robert Bos, Frederic GOUTH, Gust MEES
more...
Jean-Robert Bos's curator insight, January 14, 2013 7:43 AM

Les récentes déclarations de Symantec déclaraient récemment que de faux codes QR sont fréquemment trouvés dans les lieux publics (métro, aéroports, centre-ville) : des organisations ayant pris la fâcheuse habitude de coller des codes QR malveillants en lieu et place des codes QR officiels sur des publicités, affiche ou affichage officiels.

Gust MEES's curator insight, January 17, 2013 5:13 AM

À voir également :

 

- http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Norton+Snap

 

Gust MEES's curator insight, January 17, 2013 5:27 AM

MUST read ALSO:

 

http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Norton+Snap

 

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

TOP 20 countries where web resources are seeded with malware

TOP 20 countries where web resources are seeded with malware | Wepyirang | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 8:29 AM

 

 

Learning the basics of Cyber-Security is ALSO a MUST in the 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use the Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

===> Some countries are looking really BAD and they SHOULD introduce "Teaching the basics of Cyber-Security!!! <===

 

Gust MEES's curator insight, January 14, 2013 8:34 AM

Learning the basics of Cyber-Security is ALSO a MUST in the 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use the Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

===> Some countries are looking really BAD and they SHOULD introduce "Teaching the basics of Cyber-Security!!! <===

 

Rescooped by Jimun Gimm from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs hit by new wave of money-stealing malware 

Macs hit by new wave of money-stealing malware  | Wepyirang | Scoop.it

Apple users who think they're immune to malware and other bugs need to pay attention: A new Trojan is infecting Apple computers in order to obtain victims' phone numbers and rob them via unexpected premium SMS charges.

The Trojan, which masks itself as downloadable software, presents victims with a legitimate-looking installation wizard that asks for their phone number in order to verify or authenticate the install.

Read more:
http://www.nbcnews.com/technology/technolog/macs-hit-new-wave-money-stealing-malware-1C7563684


Via Gust MEES
more...
Gust MEES's curator insight, December 13, 2012 11:52 AM

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity