The document discusses the computer as a teaching tool and its capabilities to support constructivist and social constructivist learning theories. It explains that constructivism focuses on students individually constructing knowledge from gathered information, while social constructivism emphasizes knowledge construction through social interaction and cultural influence. The computer can serve as an informative tool by providing vast resources, as a communication tool for collaboration, as a constructive tool for building knowledge, and as a situating tool to create virtual environments. Examples are given of applications like Super Why, Star Chart, and Math Helper that teachers can use in hands-on ways to engage students in literacy, science, and math skills.
CONSTRUCTIVISM was introduced by Piaget (1981) and Bruner (1990). They gave stress to knowledge discovery of new meaning/concepts/principles in the leaning process.
Students are also asked to apply discovered knowledge to new situations, a process for making their knowledge applicable to real life situations.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
CONSTRUCTIVISM was introduced by Piaget (1981) and Bruner (1990). They gave stress to knowledge discovery of new meaning/concepts/principles in the leaning process.
Students are also asked to apply discovered knowledge to new situations, a process for making their knowledge applicable to real life situations.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
3. • F
1/7/20XX 3
• The students will develop an understanding
about the computer as a teacher’s handy tools
supporting the constructivist and social
constructivist of learning.
• Be able to understand and modify diiferent
computer capabilities and different application
that can be used by the teachers as a handy
tool in school.
4. • Focuses on the collaborative nature of
learning.
• the theory that says learners construct
knowledge rather than just passively take
in information.
CONSTRUCTIVISM
1/7/20XX 4
5. • Focuses on the collaborative nature of
learning.
• Knowledge develops from how people
interact with each other, their culture, and
society at large. Students rely on others to
help create their building blocks, and
learning from others helps them construct
their own knowledge and reality
SOCIAL CONSTRUCTIVISM
1/7/20XX 5
6. 6
Learning Framework Constructivism Social Constructivism
Assumption
Knowledge is constructed by
the individual
Knowledge is constructed
within s social context
Definition of Learning
Students build their own
learning
Students build knowledge
influenced by the social
context
Learning Strategies
Gather unorganized
information to create new
concept/principle
Exchange and share form
ideas, stimulates thinking
General Orientation
Personal Discovery of
Knowledge
Student discuss and discover
meanings
7. THE COMPUTERS
CAPABILITIES
7
Based on the two learning theories,
the teacher can employ the
computer as a/an:
•An information tool
•A communication tool
•A constructive tool
•As co-constructive tool
•A situating tool
8. The computer can provide vast amounts of
information in various forms, such as text, graphics,
sound, and video.
INFORMATIVE TOOL
1/7/20XX 8
CONSTRUCTIVE TOOL
The computer itself can be used for manipulating
information, visualizing one’s understanding, and building
new knowledge.
9. Students can use co-constructive tools to work
cooperatively and construct a shared understanding
of new knowledge.
CO-CONSTRUCTIVIST
TOOLS
1/7/20XX 9
Co-constructivist tools. Students can use co-constructive tools to work cooperatively and construct a shared understanding of new knowledge. One way of co-construction is the use it f the electronic whiteboard where stud
Th
SITUATING TOOL
By means of virtual reality (RS) extension
systems, the computer can create 3-D images
on display to give the user the feeling that are
situated in virtual environment.
11. Students build reading
power with this
collection of four Super
Why interactive literacy
games from PBS Kids.
1/7/20XX Pitch deck 11
SUPER WHY
12. Students can now have a
virtual planetarium in their
pockets. They can look
through the eyes of their
Android devices to open a
virtual window into the whole
visible universe. All they have
to do is point their Android
device at the sky, and Star
Chart will tell them exactly
what they’re viewing..
1/7/20XX Pitch deck 12
STAR CHART
13. This universal assistant
helps students solve
mathematical tasks,
showing the answer as
well as a detailed
solution. .
1/7/20XX Pitch deck
MATH HELPER