Online learning has shown a massive growth over the last decade as the internet and education join hands to provide people with varied opportunities to learn new skills. And after the pandemic, online learning has become the new norm today. The lockdown has forced schools, colleges, companies to work within the confines of their homes and thus enhanced the usage of online learning. Let’s understand in-depth what are the pros and cons of online learning.
Online learning has shown a massive growth over the last decade as the internet and education join hands to provide people with varied opportunities to learn new skills. And after the pandemic, online learning has become the new norm today. The lockdown has forced schools, colleges, companies to work within the confines of their homes and thus enhanced the usage of online learning. Let’s understand in-depth what are the pros and cons of online learning.
A brief about online education, which can guide a student whether to opt for online education or continue with the traditional mode of education. This includes comparison of Online education and traditional education.
'The 21st Century Learner: Blended Learning tools and the use of social networksBex Lewis
On 26th March, Dr Bex Lewis will be running a Collaborative Enhancement and Teaching (CET) Lunch, 12.30 - 2pm
The topic will be 'The 21st Century Learner', with discussions on blended learning tools and the use of social networks.
CET lunches are an informal space to discuss and share learning and teaching experiences/practice across the university.
The session will include discussions as to what differences there may be with "The 21st Century Learner", a summary of Sir David Melville's CLEX report from March 2009, a consideration of what Blended Learning is, visual stats, and a look at some potential tools/their uses.
(The presentation was somewhat a 'work in progress', and there's a lot more depth I'd like to investigate, but it generated great discussion, and some thinking for me/others!)
A brief about online education, which can guide a student whether to opt for online education or continue with the traditional mode of education. This includes comparison of Online education and traditional education.
'The 21st Century Learner: Blended Learning tools and the use of social networksBex Lewis
On 26th March, Dr Bex Lewis will be running a Collaborative Enhancement and Teaching (CET) Lunch, 12.30 - 2pm
The topic will be 'The 21st Century Learner', with discussions on blended learning tools and the use of social networks.
CET lunches are an informal space to discuss and share learning and teaching experiences/practice across the university.
The session will include discussions as to what differences there may be with "The 21st Century Learner", a summary of Sir David Melville's CLEX report from March 2009, a consideration of what Blended Learning is, visual stats, and a look at some potential tools/their uses.
(The presentation was somewhat a 'work in progress', and there's a lot more depth I'd like to investigate, but it generated great discussion, and some thinking for me/others!)
Presentation of Simon Paul Atkinson for EDEN's Education in time of pandemic webinar series on 'How to engage and support students online' - 27 April 2020, 17:00 CEST
More info:
https://www.eden-online.org/how-to-engage-and-support-students-online/
Making a difference with technology-enhanced learning - Scott Hibberson and S...Jisc
Led by Scott Hibberson, subject specialist - online learning and the digital student experience, Jisc.
With contribution from Sue Watling, academic adviser - technology enhanced learning, University of Hull.
In this session there will be a focus how technology can support learning and teaching for a better student experience. Local providers will be sharing how their technology-based approaches have made a difference for learners and teachers.
Connect more in Liverpool, 21 June 2016.
Thoughts leaders shall share their thoughts and insights on What will education look like in 2020? and How will information technology evolve to meet the needs of the students, faculty and administration?
LIASA Pre-conference Workshop 3: Mobile LiteracyKidsintheCloud
Presented on 30 Sept. 2019 at the Durban International Conference Centre, SA.
Mobile Literacy in South Africa is an ecosystem of projects and initiatives by a variety of stakeholders that promote, support and enable access to literature and literacy projects on mobile devices, especially mobile phones, in the context of informal education. Mobile literacy is also known by the abbreviation mLiteracy.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
5. “Kids not only need to be proficient in how to use digital
technology, becoming savvy coders and prolific ebook
readers, he explains—they also need to deeply, holistically,
and realistically understand how the digital world works
behind the scenes.
They are consuming and seeing so many things online that
they don’t know how to put it into context or how to
evaluate it."
6. “At the same time, "even schools that have called
themselves very technologically advanced haven’t even
begun to explore how they actually teach [about that
technology]," he said. They may hand out iPads or laptops to
students, but such education often stops at the hardware.
"Curriculum is the microcosm of what’s going on in society; I
think that curriculum needs to catch up with the reality."
11. Norms of appropriate, responsible behaviour with regard to
technology use
Digital access for all
Digital consumers doing online business
Digital communication
Digital literacy for searching & processing information
Digital etiquette
Digital Citizenship (1)
12. Digital law (plagiarism, illegal downloads, hacking, creating
and spreading worms, viruses, Trojan Horses, sending spam,
stealing identity)
Digital rights & responsibilities (right to privacy, free speech)
Digital health & wellness (safety, self-care, cyber-bullying)
Digital security (virus protection, back-up’s)
http://www.digitalcitizenship.net/Nine_Elements.html
Digital Citizenship (2)
13. To become an empowered digital citizen, with competency
in various application software tools and the Internet.
To become an effective downloader of content, but also an
uploader of media and a contributor to the world of
knowledge.
To apply self-learning and to continuously grow in terms of
using computer technology as a tool.
Expected Outcomes
14.
15.
16. Adult learners
Prefer sense of self-control, autonomy, self-direction
Learning must be relevant, purposeful, to achieve goals
Time limited
Wealth of knowledge
Results-oriented – expectations met
Potential limitations
Successful if internally motivated
17. Child learners
Other-directed – depend on teachers, parents
Perception of time different
Learn what they are told
Limited experience base
Learn quickly, open to new information & to change views
Expectations less well defined
Externally motivated
56. Tips …
Remember that everything is connected
Observe, learn and get ideas from others
Analyse, ask questions, think critical
Explore, experiment, dare, take chances
Follow an agile approach – don’t resist change, but think about
how it can be to the benefit of society in general
Nobody will ever know everything
Learn something new every day!
Change cannot be avoided ….
57. Career Planning
Support, prepare, advice, provide guidance to learners for
the world of work, with specific emphasis on the digital
environment:
Library Career Portal (web page)
Library Newsletter
Workshops (training)
Events (exhibits & speakers)
58. Library Career Portal (web page)
Provide information on the following (self-help):
◦ Options following Grade 12 (Work, University, University of
Technology, TVET, Learnerships, Online Courses)
◦ Different careers (Google Search)
◦ Job Vacancies (Google Search, Google Alerts)
◦ Curriculum Vitae (Word)
◦ Cover Letter (Word)
◦ Interviews & Questions (YouTube)
59. Library Newsletter
Communicate information on the following:
◦ Information added to web page
◦ New jobs – also advertising opportunity for local businesses
◦ People looking for jobs
◦ New trends
(Gmail, Google Groups)
61. Events
Invite users to the following:
◦ Exhibit on careers – also virtual (incl. video recordings)
◦ Speakers/presenters – also virtual
◦ Career corner in library
◦ Organising an event (Google Forms)
62. Thank you!
Ina Smith & Annamarie Goosen
In the Cloud - Kids in the Cloud (Pty)Ltd
https://inthecloudweb.wordpress.com/
librarianscloud@gmail.com
Editor's Notes
For over 40 years now, UNESCO has been celebrating International Literacy Day by reminding the international community that literacy is a human right and the foundation of all learning.
Literacy is a cause for celebration since there are now close to four billion literate people in the world. However, literacy for all – children, youth and adults - is still an unaccomplished goal and an ever moving target.
According to data released by the UNESCO Institute for Statistics, literacy rates for adults and youth continue to rise. Young women aged 15-24 are making the strongest gains, but still lag behind young men. In 2011, 87% of female youth had basic literacy skills, compared to 92% of males. Overall, more than half of countries with data have youth literacy rates of 95% or higher.
Despite these gains, 774 million adults (15 years and older) still cannot read or write – two-thirds of them (493 million) are women. Among youth, 123 million are illiterate of which 76 million are female. Even though the size of the global illiterate population is shrinking, the female proportion has remained virtually steady at 63% to 64%.
A combination of ambitious goals, insufficient and parallel efforts, inadequate resources and strategies, and continued underestimation of the magnitude and complexity of the task accounts for this unmet goal. Lessons learnt over recent decades show that meeting the goal of universal literacy calls not only for more effective efforts but also for renewed political will and for doing things differently at all levels - locally, nationally and internationally.
In South Africa, government has launched the Kha Ri Gude Mass Literacy Campaign in February 2008, with the intention of enabling 4,7 million adults above the age of 15 years to become literate and numerate in one of the eleven official languages. Achieving this goal will enable South Africa to reach its UN: Education For All commitment made at Dakar in 2000 - that of halving the country’s illiteracy rates by 2015.
Initiated and managed by the Department of Education, Kha Ri Gude delivers across all nine provinces in a massive logistical outreach. The campaign enables adult learners to read, write and calculate in their mother tongue in line with the Unit Standards for ABET level 1, and also to learn spoken English.
Globally, there are 50-75 million ‘marginalized’ children who are not enrolled in school. Children whose primary language is not the language of instruction in school are more likely to drop out of school or fail in early grades. Research has shown that children’s first language is the optimal language for literacy and learning throughout primary school (UNESCO, 2008a). In spite of growing evidence and parent demand, many educational systems around the world insist on exclusive use of one or sometimes several privileged languages. This means excluding other languages and with them the children who speak them (Arnold, Bartlett, Gowani, & Merali, 2006).
Classroom is a new tool in Google Apps for Education that helps teachers create and organize assignments quickly, provide feedback efficiently, and easily communicate with their classes. Learn More