Building Bridges between Academic TribesMartin Rehm
The document discusses building an online group blog called SHARE-IT to facilitate knowledge sharing across academic disciplines. A survey of 18 researchers found generally positive attitudes toward contributing to and using the blog. Respondents anticipated the blog would strengthen relationships and help others. However, some expressed concerns that contributions may be too generic or that open accessibility could disincentivize sharing. The authors propose addressing such issues and expanding the blog's target groups and comparative research to help knowledge sharing.
Slides to support a workshop at a University of Suffolk teaching and learning day on 14 December 2016. The workshop looked at challenges involved in sourcing digital resources for learning and teaching, and discussed the role that OER might play. We also looked briefly at the Jisc resource and app store, in beta at December 2016.
Building Bridges between Academic TribesMartin Rehm
The document discusses building an online group blog called SHARE-IT to facilitate knowledge sharing across academic disciplines. A survey of 18 researchers found generally positive attitudes toward contributing to and using the blog. Respondents anticipated the blog would strengthen relationships and help others. However, some expressed concerns that contributions may be too generic or that open accessibility could disincentivize sharing. The authors propose addressing such issues and expanding the blog's target groups and comparative research to help knowledge sharing.
Slides to support a workshop at a University of Suffolk teaching and learning day on 14 December 2016. The workshop looked at challenges involved in sourcing digital resources for learning and teaching, and discussed the role that OER might play. We also looked briefly at the Jisc resource and app store, in beta at December 2016.
The document discusses adding tables to web pages. It describes how to insert tables, add captions and headings, and format tables by adding borders. The key points are:
1) HTML tags like <TABLE>, <TR>, and <TD> are used to create tables and add rows and cells.
2) The <CAPTION> tag adds a caption to identify the table, while the <TH> tag formats column headings in bold.
3) The Border attribute of the <TABLE> tag sets the width of borders around the table.
Unit 1.3 Introduction to Programming (Part 3)Intan Jameel
The document discusses creating and formatting presentations in PowerPoint. It covers topics like adding slides, applying templates and layouts, inserting pictures and text, animating objects and slides, adding action buttons and hyperlinks, packing presentations to other devices, and publishing presentations as web pages. The overall aim is to teach learners how to design and enhance presentations.
Open Educational Resources and Practices for Higher EducationLis Parcell
Presentation delivered by Lis Parcell (Jisc RSC Wales) and Julia Ault (University of Wales: Trinity Saint David) at the Coleg Sir Gar HE Conference 1 July 2013. It included Ope
The document provides instructions for students to work on creating an e-brochure about a book in the computer lab. Students are told to sit with their partner, work only on the brochure project, and complete their slides that day. They are also assigned 15-20 minutes of independent reading for homework to be finished the next day.
This document provides instructions for students for their research work. It outlines the tasks for the day which include reviewing their research questions and choosing one to focus on, reading their assigned article with a partner and taking notes, and learning how to synthesize information by reviewing a model. Students are directed to use different colored pencils to identify questions and information in their research notebook to focus on for future research. The document emphasizes reading strategies and taking thorough notes to aid in the research process.
This document provides guidance and instructions for students to follow as part of their reading of the novel "A Long Walk to Water". It outlines activities for students to complete as homework or in class, including reading chapters independently and with the class, completing a reader's notebook, practicing question-based discussions, and taking a mid-unit assessment on the novel. Students are also instructed to begin finding an independent reading book to read more about related topics like war, refugees, and immigration.
El documento critica la presencia de ídolos y estatuas en la República Islámica de Irán, alegando que esto contradice las enseñanzas del Islam sobre la prohibición de imágenes. Señala que muchas figuras importantes en Irán, como comandantes militares y clérigos chiíes, tienen estatuas erigidas en su honor, similar a las prácticas paganas descritas en el Corán. También acusa al estado iraní de revivir prácticas como llorar ruidosamente por los muertos,
The document discusses caching and the Memcached caching system. It describes Memcached as an in-memory key-value store that provides fast access to data at low latency compared to accessing data from local disks. It also summarizes the Cache::Memcached::Fast Perl module for interacting with Memcached and proposes developing a simplified Agile API to make caching easier to use and support features like automatic invalidation through versioning.
This document provides instructions and materials for students to plan and begin writing an essay about the book A Long Walk to Water. It includes sections on examining a rubric, discussing vocabulary, planning an essay with claims and topic sentences, and homework expectations to complete the introduction and two body paragraphs. Students are guided to use a model essay, look at how paragraphs are ordered logically, and include specific elements like a hook, background, and conclusion in their own essays.
Core Mobile offers the Corey suite of products to coordinate healthcare activities in real-time and make them more efficient. The Corey products allow providers to update tasks on mobile devices, notify families of patient status, and access analytics and relevant patient information remotely. This increases OR utilization by 15-30% and reduces patient turnover times by 5-15 minutes, saving hospitals $1-10 million annually. Core Mobile's patented solutions integrate with existing IT systems and workflows to optimize provider coordination without disruption.
The document discusses risk management and its benefits. It defines key risk management terms and outlines the 5-step risk management process: 1) identify hazards, 2) assess hazards, 3) make risk decisions, 4) implement controls, and 5) supervise. The process aims to reduce damage, injuries, and mission failures by systematically identifying hazards, analyzing risks, and implementing controls to mitigate risks.
SHARE-IT - A Blog “from Researchers for Researchers”Martin Rehm
SHARE-IT is a blog called "from Researchers for Researchers" that aims to support academic researchers by sharing knowledge and skills using information technology. The blog serves as a community of practice for researchers to exchange tacit knowledge, provide feedback, and link virtual knowledge with real-world events. While technology acceptance models provide guidance, the success of the blog depends on researchers finding it useful and participating in discussions.
A very short overview presented Lis Parcell, Esther Barrett and Jon Agland, highlighting some Jisc RSC Wales services and activities of interest to staff of Swansea University Information Services and Systems (our host department). The focus was on our events and information services for HE, as well as our community learning activities.
Finding and sharing good stuff: open practice, open educational resources and...Lis Parcell
Slides to support a Jisc session at the Eastern region e-forum hosted by University of Essex on 21 October 2016. Participants were from a range of further and higher education institutions across East Anglia. Group discussion formed a component of the session.
Communes, Commonism and Co-ops: Rethinking the university as a hackerspaceJoss Winn
My abstract for the British HCI conference 2015 at the University of Lincoln. I'm on the 'HCI, politics and activism' panel.
In this talk I reflect on the history of hacking and its origins in the 'commune' of the academy (Winn, 2013). I then discuss the role of Copyleft licenses (Stallman, 2010) as "the practical manifestation of a social structure" (Weber, 2004, 85; Winn, 2015); a form of administration for the production of 'commonism' (Dyer-Witheford, 2007; Neary and Winn, 2012). Finally, I argue that the emerging form of 'open co-operative' can be understood as a latent material response to Stallman's original predicament when Venture Capitalism took over his 'Garden of Eden': mutual ownership and control of knowledge production. Significantly, the "crucial innovation" for an emerging form of 'open co-operative' (Bauwens, 2014) is a further adaptation of Copyleft called Commons-Based Reciprocity Licenses, or 'Copyfarleft' (Kleiner, 2007), thereby uniting co-operative legal structures with subversive licensing contracts. To what extent can we reconstitute higher education and the idea of the university along the lines of an open co-operative, so that academic science can continue to contribute to the common good? (Winn, 2015) All Power to the Communes!
asm.js x emscripten: The foundation of the next level Web gamesNoritada Shimizu
Game requires high performance to its run times. asm.js brings Web browsers high performance JavaScript processing and allows us to build heavy games on the top of Web browsers. In this talk, we can see 1 )the background of asm.js 2) asm.js details and 3) overview of emscripten, a compiler which emits asm.js formatted JavaScript code from C/C++.
asm.js の詳細と emscripten の簡単な使い方について解説します。