Tuesday, May 1, 2012

Content Curation

Storify can be used to help students connect with the news. Photos and videos can be collected and merged into one document that chronicles events. Storify would be great to use in a history classroom to create a timeline of events. It could also be used to create a multimedia book report. The following link gives additional information about Storify: http://wordpress.org/extend/plugins/storify/. The storify logo looks like this
storify curation tool

Intervue Me

Intervue is an excellent tool. Teachers can pose open ended questions and students can give video responses to the questions. This would also be an excellent way for students who may want some input about various subject matter to pose questions. People can click on the question and if they opt to respond, give a video response. The responses can either be public or private. Elementary teachers can use this to give spelling tests and have students spell the words. Also, this would be a great tool to use to do virtual literature circles and have book talks.

Remind 101

Remind 101 is a website that allows teachers to communicate with students and parents. Once a teacher adds a class, a unique code is generated. The teacher shares the code with the students and parents and they can use this code to subscribe to the teacher's class. Teachers can send messages about homework, field trips, tests, PTO meetings. Any information that the teacher needs to make the students and parents aware of can be shared via Remind 101. I highly recommend teachers to go to https://www.remind101.com/ and sign up immediately to begin using this excellent resource.

Narrative Games 2

After trying unsuccessfully for about five minutes to get through the front door in Covert Front, I finally gave up and looked at the walk through. I don't think I would have ever figured out on my own how to get in. I thought repeatedly buzzing the intercom was the key, but I was very wrong. After peeking at the cheat sheet so that I could get through the front door, I promised myself that I would not look at it again. However, after wandering around aimlessly in the mansion and clicking on every object in sight, I soon got tired and decided, to look at the walk through again. It was much easier once the instructions were laid out. I went in the kitchen and got the ice pick and matches, I went in the room and set the clock in order to get the clock key. I went in the little room under the stairs and went several other places inside. I pointed and click for a while until I got tired of seeing "go back" pop up. I did not enjoy playing Covert Front.

Thursday, April 26, 2012

Genetics-The Key to Immortality

The theoretical physicists in this video talks about within ten years everyone will be able to obtain a digital copy of their genome for about $1000. The codes will be compared and cures may be found for diseases and aging.

<object width="640" height="360"><param name="movie" value="http://www.youtube.com/v/QsHuGQieyjY&rel=0&hl=en_US&feature=player_embedded&version=3"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/QsHuGQieyjY&rel=0&hl=en_US&feature=player_embedded&version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="640" height="360"></embed></object>

Identity Theft: Fighting Back

     According to the handout, Take Charge: Fighting Back Against Identity Theft , criminals can steal your identity by gaining access to your personal information. They do this by stealing information while they are on jobs, they hack into your personal information, they steal your mail (this may include bank statements, credit card offers, and checks). The criminals also engage in a practice called dumpster diving in which they rummage through trash dumps to get discarded personal information about the victim. They may steal your wallet or purse and engage in email scams to get information.
     A person's identity is stolen when someone gains unauthorized access into their personal accounts. The victim has accounts opened up in their names by the criminal. The thief may get a driver's license issued with their picture and the victim's name. The thief counterfeits checks and make plenty of unauthorized purchases in the victim's name. The thief may get phone service or other utility services in the victim's name.
     If you are a victim of identity theft, you should place a fraud alert on credit reports and review credit reports. Government issued identifications should be cancel and replacements should be obtained.  Accounts should be closed and a police report should be filed. In addition, a complaint should be filed with the Federal Trade Commission.
     A person can prove that he/she is a victim of identity theft by presenting records with fraudulent signatures. Companies should also be contacted to get records of transactions. This can be a lengthy process; therefore, the victim needs to be very organized and knowledgeable about the case in order to prove that his/her identity was indeed stolen.



Monday, April 23, 2012

Sweatin' Outside My Comfort Zone

I worked out with my aunt. That was definitely outside of my comfort zone. My aunt is 63 years old, but she has the energy of a 16 year old. I explained to her that I was trying to get some points for my class, but she did not have any mercy on me. She popped in her Jillian Michael's exercise DVD and proceeded to call out commands to me as if she starred in the making of this video herself. This workout involved a lot of jumping around and squats. I really had a hard time keeping up and kept glancing at my watch so that I could call it quits. After it was over, I hobbled to the refrigerator to get some water and to reflect on the fact that I really need to become more active because my aunt who is almost twice my age had just shamed me. I do recommend this exercise DVD to others who are interested. Maybe one day I will build up the courage to try it again. If and when I do try it again, I will do it by myself.