A cold day in Philadelphia
I’m presenting today at the CASE/NAIS conference — I’m in the Uncharted Territory track, which seems oddly appropriate
For those interested, the presentation is available here (ppt download, 331 KB).
Cheers!
home | about us | contact | ethos | services
A cold day in PhiladelphiaI’m presenting today at the CASE/NAIS conference — I’m in the Uncharted Territory track, which seems oddly appropriate For those interested, the presentation is available here (ppt download, 331 KB). Cheers! OpenAcademic Project Wiki now openOver the last few months, I’ve received a few emails about how to get involved in the project. Toward that end, we set up a Mediawiki instance at http://wiki.openacademic.org. The wiki is pretty barren now, but we will be fleshing it out with more details on our roadmap, and our ideas all steps of the development process. Since we brought the site live, one of the challenges we have faced is balancing the time necessary to do the work with the time necessary to let people know about the work. It’s an ongoing challenge, and we hope the wiki will help alleviate some of that inherent tension. We are looking for people who want to get involved — people who are using these tools in the classroom, and developers who are writing code that supports a focused integration between these tools, and folks who are just plain interested. If you match any of those definitions, or even if you don’t, come on down. And, it is OpenID enabled. Current StatusI’ve been wanting to find the time to write this post for a while, but different things (aka work, life) kept getting in the way. For those who are interested in getting started in putting the different pieces of OpenAcademic together, here are some of the building blocks. A Moodle 1.6 OpenID consumer: This code was written by , with the install tested by Kevin and us. The code is available here: We have not tested this code in a shared hosting environment, but we have tested it in a few different LAMP stacks. For those of you who are comfortable working in a Linux environment, the install is pretty straightforward. The one main obstacle we encountered was with miscompiled gmp libraries, and we documented the fix for this in the ReadMe.txt that comes with the download. For the generally curious, you can find out more about gmp here. A Mediawiki OpenID consumer: This code was written by Evan Prodromou, with some patches by Jonathan Daugherty. IE, these guys did all the work, and deserve all the credit The code, and a description, is available here: http://www.mediawiki.org/wiki/Extension:OpenID This install was also pretty straightforward, and, on our servers, also required that we recompile the gmp libraries. The readme for the Mediawiki code contains excellent instructions. Educational Use: There are a few nice things about these OpenID consumers, but my favorite feature is the trust routes. Both consumers allow the site admin to set domains that are fully trusted, partially trusted, and completely blocked. A member authenticating from a fully trusted domain gains access without needing to verify an email address. A member of a partially trusted domain can gain access, but, the first time they join the site they need to verify some basic information. Subsequent logins are then streamlined. And, at the risk of stating the obvious, people attempting to gain access from blocked domains will never be able to gain access. In an educational context, this means that an organization can set up an incrementally walled garden. People from selected schools can be granted access to specific shared resources (and denied access to others). People from other organizations can be granted access to selected resources, but only after their credentials are checked and verified. And, uninvited guests won’t be able to gain access. In this context, OpenID provides the means to open up a learning environment between schools without requiring multiple passwords, and without opening the entire system to the entire internet. When combining the flexibility of OpenID with the flexible access control of different applications, one has a broad range of options for supporting online collaboration while protecting student privacy. An organization can set these tools up to be as open or as closed as they prefer. Next steps: Now, I just wish I knew some bryght folks who were working on a Drupal-based OpenID server and consumer. That would be very nice indeed. Don’t Let The API Hit You On Your Way OutAs I’ve discussed here and here, there are risks involved with using free services offered by organizations who keep their code — and your data — out of your reach. Google recently announced that they are shutting down support for their SOAP search API in favor of an AJAX-based API. To translate the geek-speak: Google used to allow people to build applications that would use Google’s search features, but return the results outside Google. Now, with the AJAX API, the results are displayed within Google. With this shift, Google has replaced a very useful tool with more limited option. Admittedly, this is a pretty small shift. And, Google has a very good argument in that they don’t have to give anything away for free — and both of Google’s API’s are completely free. But, from the perspective of educators, what would happen if, in the middle of a course, the ability to access your material changed? How would you cope if, for example, your free service changed to a fee-based service? You would be faced with a choice: ante up the cash to finish the term, or lose access to your work. When you rely on the largesse of a company providing a free service, you assume and hope that their largesse will continue. But, on the chance that the terms of service shift midstream, what’s plan B? See you in Philadelphia!Note: Forward this to your “Shameless Commerce” division… If you’re going to be in Philadelphia at the end of January, consider making some time for any one of a series of workshops being hosted by Steve Hargadon at the Science Leadership Academy. The principal of SLA, Chris Lehmann is hosting the sessions: run by Michelle Moore on January 29th and 30th; run by Will Richardson on February 2nd and 3rd; and run by yours truly. In planning my session, I’m trying to build a training that allows educators to use the tools they learn about. Toward that end, all participants in the Drupal session will receive Drupal hosting through August 2007. So, a workshop participant can learn how to build curriculum in the session that they can deliver on their first day back in the classroom. For those interested, here’s a rundown of the curriculum I’ll be covering – Overview: This workshop will cover how to access Web 2.0 tools in a secure educational environment. Participants will learn how to work in Drupal to give students access to social bookmarking, blogging, podcasting, and collaborative workspaces. Participants will also learn how to design curriculum within the site, and best practices for working in an online environment. All participants in this session will also receive hosting for a fully configured Drupal site through August, 2007, as part of the conference cost. As this is a working session, participants are encouraged to bring materials from lessons they are planning. The goal of this session is to provide participants with tools they can use immediately in their classrooms. Day 1:
Day 2:
Steal This LinkSome interesting thoughts about media literacy, google bombing, and white supremacism in a conversation started by Tom Hoffman and moved along by Will Richardson. So, let’s get some of the important stuff out of the way: Martin Luther King Jr. On a seemingly unrelated note, in several other places I’ve seen hue and cry about the need to teach MySpace to students. On the sites where people actually take the time to explain what they mean by this, they usually equate “teaching MySpace” with teaching students how to protect their personal information online. I shudder when I read these posts because I wonder if these people are really serious, or if they are cynically using the popularity of MySpace as a search term to buoy their own pagerank, and, by extension, their perceived credibility. To me, online security and Google bombing both fall under the umbrella of media literacy. As the whole lonelygirl15 show demonstrated (and I’m intentionally not linking to any sources about this; if you need background, just google “lonelygirl15”), Identity is now content. MySpace, and YouTube, and blogs, and podcasts, and [fill in the blank with another web 2.0 buzzword] blur the lines between content creators and content consumers, but make no mistake about it: content is being consumed, and professional content creators (we can just call them salesmen or advertisers) are infiltrating “amateur” spaces in increasingly sophisticated efforts to work an angle and make a buck. Credibility can now be gamed. Popularity can now be gamed. People actually spend time trying to figure out how to . I don’t point this out to criticize the internet, merely to demonstrate that the same issues that exist in Meatspace exist online. There is nothing wrong with making money. Even I try and do it on occasion. But, whether one is online or offline, ethical lapses abound. As educators and learners, our responsibility remains unchanged: how do we help our students and peers analyze the information they consume? As Tom Hoffman points out in another post, this isn’t new ground. As a species, we have made use of critical thinking in past generations. But, as the tools for gaming credibility change, we need to teach our students how to look behind the curtain. And this points to a frequently-overlooked value of blogging. Many people see blogging as the act of finding an audience, and denigrate blogging that occurs within a walled garden, or within a course that isn’t accessible to the entire internet. These folks miss the point. Blogging can be about finding an audience, but it also provides an accessible medium for finding a voice. In the process of learning how to structure an argument, one also learns how to spot strengths and weaknesses in the arguments one encounters. Through learning the technical aspects of writing well, one can learn the critical and analytical skills needed to navigate the internet safely. Oh, and one other thing. Critical thinking works pretty well offline, too. Edinburgh and ReturnThe last few days have been busy. I flew in to Edinburgh from Portland for Curverider’s first conference on social networking tools in education. My trip was relatively short — I landed on Friday and left Tuesday. While in Edinburgh, I managed to squeeze in a few touristy bits and pieces, but a good portion of every day was devoted to meeting with these guys and . The meetings took place On a side note, these pre-conference meetings marked the first time many of us had met face to face. For me, this fact illustrates the potential of the tools we are developing — we all got to know each other as a result of our interest in and involvement with open source social software. The same idea held true for the speakers and attendees of the conference. The presenters and audience members all looked at the use of these tools with different lenses, but, without the social software tools — and in particular without Elgg itself — it’s pretty likely that this meeting would not have been possible. Seriously — what are the chances of getting a Canadian distance learning research chair together with a researcher from an art school together with the head of a British school together with a distance learning director and doctoral student from Florida together with a Scottish K12 educator and edublogger? On paper, the niches are pretty disparate, to the point where meaningful interaction would seem unlikely. However, because we all are using a common tool that breaks down some of the traditional barriers impeding connections among likeminded individuals working in different fields, we all chose to come together and talk things over. I could tell you about the presentations, but you don’t need to take my word for it. Mark Berthelemy has a , and soon, you will be able to check them out on Google Video. After the conference, a good portion of the attendees Personally, like many others have said, I enjoyed the opportunity to attach faces to names. I had been familiar with the work and thoughts of many of the people at the conference, and it was fun to see the person behind the avatar. So, as I sit in my cramped seat (believe it or not, it’s true — developers of open source projects do indeed travel coach) in the middle of my return to Portland, I have a headful of ideas to blog, a stack of notes to organize, and a to do list as long as my arm. In setting priorities, I think it best that I give some extra weight to the elements that get the development community online, so I’ll probably be engaging in less talking and more doing (or, as Elvis says, a little less conversation, a little more action please), but either way, some Good Things are afoot. We’ll be updating progress announcements to the blog as they come online. Stay tuned. Vocab DaydreamsFor a K-12 language educator, teaching vocabulary presents some singular challenges. While we all agree that vocabulary is a critical skill, the agreement tends to disappear when it comes to how to present vocabulary in a classroom setting. Talking about words has the potential to expose students to the power and paradox of language; however, vocabulary instruction frequently descends to a balance between exposing students to as many words as possible, defining the words clearly, and keeping the class awake in the process. The challenge: minimize the rote repetition, maximize the time spent using the words. A. One way through the morass: A teacher logs onto a web site and types a list of words into a form. When the teacher submits the form, the following web pages are automagically created:
Later in the post, I’ll explain how this can work. For now, though, let’s take a look at what this could achieve. In the time it would take to type ten or twenty words, an instructor could present students with a list of words and reliable definitions. Some online dictionaries also have pronunciation guides. The master page with all the words organizes the words in one place, to simplify studying for vocab exams. The individual pages for each word create some possibilities. From the pages containing individual words, students can be assigned (on a student-per-word basis) to:
Students could add their responses as comments on individual words, or as blog posts.The list included here is a quick start. A range of possibilities exist, and the best approach will be determined by the nature of the class. Speeding up the delivery of the definitions allows more class time to be spent working creatively with the words. As with any subject, questions will arise. Using this approach, however, the questions and their subsequent explanations are rooted in specific, concrete examples. I have taught vocab in this way with some classes — coding the links by hand, of course, and by having students respond on paper if and when internet access was an issue. I buttress this approach with flashcards, and I’ve found that students tend to retain the definitions fairly well over time. In my classes, I have had students tell me that the process of learning the word (the limerick, the paragraph scene, the zeugma) became the mnemonic device through which they retained it. Of course, this is all anecdoctal, so take it for what it’s worth. B. Taking a step back: This approach has applications beyond studying vocabulary — instead of searching a dictionary site, however, you would want to search through a broader range of sites. In a Biology classroom, an instructor preparing their class to learn about photosynthesis could type in: photorespiration, carbon fixation, Calvin cycle The comma marks the break point between individual search strings. In a World History course, an instructor could type in: British colonial expansion India, British colonial failures India, British colonial wars India, British colonial rule Mahatma Gandhi For what it’s worth, the same search strings for the World History course could also be used to teach online research methods and the critical thinking skills required to analyze bias in source material. C. How this works: It’s all about hacking search urls. Most search urls are composed of a prefix, the actual search string, and, in some cases, a suffix. The prefix generally contains the site address, plus some additional info to access the search. Looking at a few examples will help illustrate the point. Example 1. Click here to get a definition of peripatetic from Merriam Webster online, and here to get a definition from Dictionary.com. If you look at the url at m-w.com, you will see that the prefix is With the url for Dictionary.com, the prefix looks a bit more verbose: The prefix for this search is Example 3. for the Calvin cycle. As would be expected, Google offers some fun options. For the basic search, the prefix is Example 4. Use Google to for information on invasive species. In this example, the prefix remains the same: However, by attaching the suffix By the way, to run a Google search in safe mode, just change the prefix: At the risk of oversimplifying the process, to build this app, you’d set the code up to take the comma-separated values (as seen in this example), and build a search url by concatenating the prefix, the string, and the suffix. D. Next steps: The bad news? This app doesn’t exist, yet. The good news? It wouldn’t be too hard to build. My initial instinct would be to build it within Drupal and include this functionality in Drupal-based class sites. Left to our own devices, we’ll probably build it at some point, if or when our workload lightens up. If a developer is interested in building this out, we’d be glad to work with you to help you get it done; contact us and let us know. If someone wants this functionality, or if a couple schools want to get together to sponsor development on this, that’d be great too. No matter the route, it will get built, and released back to the open source and educational communities. It’s just a question of when. UpdateA quick note to let you know that things are moving along very well and we will have more for people to see and check out shortly. SSO is now working between the apps, searching between apps is developing nicely as is a common theme. The Dev community will be up and running over the next week or so and we are exploring a couple of potential partnerships. More to come shortly! The first weekSince announcing the OpenAcademic project last week, we have received emails from a wide variety of people and institutions expressing interest and offering help. It’s been a busy week, and the upcoming weeks promise to be even busier, but, based on the initial interest we have received, it feels good to be setting up a project that brings these open source tools to the educational community. In the next couple of weeks we will launch the development site for the project — this site will open up the development community, and support those wanting to help out. The roadmap is being finalised and will appear shortly and as always, we will continue to keep you posted via the OpenAcademic blog. We are very excited about the work going on here, and the potential as we move forward. Thanks for your interest, and check back here for the latest details. Cheers, The OA team |