This presentation was created to introduce the staff at an elementary school to blogging. It provides an overview of blogging and suggested uses with students.
This presentation was created to introduce the staff at an elementary school to blogging. It provides an overview of blogging and suggested uses with students.
How broad & deep is your digital footprint? Sort out the essentials to clarify you en r web strategies via blogs & social media communities. Begin with SEARCH principles such as keywords & SEO essentials, then strategically build one digital block to the next. Designed for those new to social media, seasoned users may want to expand the presentation by posting helpful comments.
This presentation gives small businesses a basic overview of how they can use social networking sites like Facebook and Twitter to promote themselves. Using examples from Coos County, Oregon, it shows how businesses have been leveraging these tools to involve and reach out to their customers.
This presentation was last given on October 5, 2010, as part of the Foundations of Business Success Skills to Prosper series by Southwestern Oregon Community College's Business Development Center.
How broad & deep is your digital footprint? Sort out the essentials to clarify you en r web strategies via blogs & social media communities. Begin with SEARCH principles such as keywords & SEO essentials, then strategically build one digital block to the next. Designed for those new to social media, seasoned users may want to expand the presentation by posting helpful comments.
This presentation gives small businesses a basic overview of how they can use social networking sites like Facebook and Twitter to promote themselves. Using examples from Coos County, Oregon, it shows how businesses have been leveraging these tools to involve and reach out to their customers.
This presentation was last given on October 5, 2010, as part of the Foundations of Business Success Skills to Prosper series by Southwestern Oregon Community College's Business Development Center.
PEDAGOGICAL BENEFITS OF BLOG IN HIGHER EDUCATIONThiyagu K
Ā
New advances in the internet based technology have brought challenges and opportunities as well to education and training, in particular through Colleges; Universities are facing increased pressures to demonstrate the effectiveness of their educational efforts. It is not sufficient anymore that course curricula are covering the right topics and Scholars pass their courses. Blogs engage people in knowledge sharing, reflection, and debate, they often attract a large and dedicated readership. Blogs are becoming an important component of the Internet landscape, providing authors and readers with an avenue for unedited expression, reaction, and connection, without the censorship of mediated chat rooms or formal media outlets. The simplicity of creating and maintaining blogs means that open discussions can be established almost immediately, making blogs an ideal venue for far-reaching discussions among the Internet community on new or timely topics. Blogs foster the growth of communities and the dynamics of collaborative filtering and recommending/referring may provide new ways to evaluate, vet, and critique student-created knowledge. This article explores the function, features and types of blog. And also describes the uses of blog in education and classroom.
A guide to blogging in academia: what blogs are, why you might want to create one, how you'd go about it, and tips to it well.
A workshop for the Learning & Teaching Forum at the University of York, delivered by Ned Potter and Simon Davis.
"Building Your Teaching Arsenal" presentation for Berwyn South District 100 professional development on August 1, 2012. This PD is for teachers beginning to build their professional learning network.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Ā
Clients donāt know what they donāt know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsā needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Ā
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā¢UiPathCommunity
Ā
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalitĆ di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
š Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
šØāš«šØāš» Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
Ā
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Ā
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Ā
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
Ā
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
Ā
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
Ā
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Ā
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more āmechanicalā approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Ā
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties ā USA
Expansion of bot farms ā how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks ā Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Introducing the Concept of a
Blog
Let us start with introducing the concept of a
blog. What is a blog, you may ask? According
to Blogger.com
:http://www.blogger.com/tour_start.g, a blog is a
personal diary:
What's a blog?
A blog is a personal diary. A daily pulpit. A
collaborative space. A political soapbox. A
breaking-news outlet. A collection of links. Your
own private thoughts. Memos to the world.
4. Introducing the Concept of a
Blog
Your blog is whatever you want it to be.
There are millions of them, in all shapes
and sizes, and there are no real rules.
In simple terms, a blog is a web
site, where you write stuff on an ongoing
basis. New stuff shows up at the top, so
your visitors can read what's new. Then
they comment on it or link to it or email
you.
Or not.
5. Introducing the Concept of a
Blog
Since Blogger was launched in
1999, blogs have reshaped the
web, impacted politics, shaken up
journalism, and enabled millions of
people to have a voice and connect
with others.
And we're pretty sure the whole deal
is just getting started.
6. The Blogās Use as a Learning
Technology according to
The three learning theories
Schuman, L. (1996). Perspectives on instruction. Available:
http://edweb.sdsu.edu/courses/edtec540/Perspectives/Perspectives.ht
ml,
are:
Behaviorism, Cognitivism and Constructivism:
The Basics
Based on observable changes in behavior. Behaviorism
focuses on a new behavioral pattern being repeated until it
becomes automatic.
Behaviorism:
Based on the thought process behind the behavior. Changes in
behavior are observed, and used as indicators as to what is
happening inside the learner's mind. Blogs cannot observe
behavioral changes to determine what is in the learnerās mind.
7. The Blogās Use as a Learning
Technology
Cognitivism:
Based on the premise that
we all construct our own
perspective of the
world, through individual
experiences and schema.
Constructivism focuses on
preparing the learner to
problem solve inambiguous
situations (Schuman, 1996).
Blogs are a very good match
with the Cognitivist theory of
leaning
8. The Blogās Use as a Learning
Technology
Constructivism:
Based on the premise that we all construct our
own perspective of the world, through
individual experiences and schema.
Constructivism focuses on preparing the
learner to problem solve inambiguous
situations (Schuman, 1996). Problem solving
inambiguous situations is a good match for
using Blogs as a learning tool.
9. A blog gives you your own voice on the
web. It's a place to collect and share
things that you find interestingā
whether it's your political commentary,
a personal diary, or links to web sites
you want to remember.
Publish Your Thoughts
10. Many people use a blog just to
organize their own thoughts, while
others command influential, worldwide
audiences of thousands.
Professional and amateur journalists
use blogs to publish breaking
news, while personal journalers reveal
inner thoughts.
Whatever you have to say, Blogger can
help you say it.
11. Blogging is about more than just
putting your thoughts on the web. It's
about connecting with and hearing
from anyone who reads your work.
With Blogger, you control who can
read and write to your blog ā let just
a few friends or the entire world see
what you have to say!
12. Blogger Comments let
anyone, anywhere, offer
feedback on your posts. You can
choose whether you want to
allow comments on a post-by-
post basis, and you can delete
comments you don't like.
Access Controls let you decide
who can read and who can write
to your blog.
13. You can use a group blog with multiple
authors as a communication tool for small
teams, families and other groups. As a
single author, you can create a private
online space for collecting news, links, and
ideas, to keep to yourself or share with as
many readers as you want.
14. Blogger Profiles let you find people and
blogs that share your interests. Your Blogger
Profile, where you can list your blogs, your
interests, and more, lets people find you (but
only if you want to be found).
15. Here are ten popular blogs according to
Margie Gelbwasser in her article:
Gelbwasser, M.. (2009, September).
THE TOP 20 TEACHER BLOGS.
Instructor (1999), 119(2), 37-39.
Retrieved February 28, 2011,
from ProQuest Education Journals.
(Document ID: 1873816341).
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27. According to go.blogger.com
Whether you're starting your blog or just think it's
time to give your existing blog a facelift, Blogger's
user-friendly editing tools help you easily design a
great-looking page.
28. ā Our lets you easily
create a that looks uniquely yours. With
just a click after selecting a template, you can
choose the colors, fonts, layout, and
background of your . But, for users who
want even more control, you can use our
to do everything
from changing the color of links to adding
custom .
29. ā Blogger's simple drag-and-drop system lets you
easily decide exactly where your posts, profiles,
archives and other parts of your blog should live on
the page.
30. Youāre never more than a click away from sharing
your favorite photo. Just click the photo icon to
upload a photo from your computer. If the photo
you'd like to put on your blog is already on the
web, that's fine too. Just paste the URL and weāll
put the image in your post.
You can also send camera phone photos straight
to your blog while you're on-the-go with Blogger
Mobile.
31. Mobile BlogSpot optimizes the layout
of your blog for those reading your blog
from a mobile device. To see what your
blog could look like on mobile devices
check out the preview functionality by
going to the Dashboard > Settings >
Email & Mobile tab.
32. SMS/MMS posting lets you
send text, photos and even
videos straight to your blog
while you're on-the-go. All you
need to do is send a message
to go@blogger.com from your
phone. You don't even need a
Blogger account. The message
itself is enough to create a
brand new blog and post
whatever photo and text you've
sent. Later, you can claim your
mobile blog or switch your posts
to another blog; just sign in to
go.blogger.com and use the
claim code Blogger sent to your
phone.
33. Email posting is another
option to consider if
SMS/MMS posting is
unavailable from your
mobile carrier. Find out
how you can use the
Mail-to-Blogger feature
to post by email.
34. Here are ten additional popular blogs according to Margie Gelbwasser in
her article: Gelbwasser, M.. (2009, September).
THE TOP 20 TEACHER BLOGS. Instructor (1999), 119(2), 37-39.
Retrieved February 28, 2011,from ProQuest Education Journals.
(Document ID: 1873816341).
11. Best Student-Written Blog
YOUTH VOICES, youthuoices.net
THE LOWDOWN: Students and their teachers participate in a
"colossal ongoing discussion about everything" via
podcasts, videos, and blogs.
WHY WE LOVE IT: This blog turns the typical student-teacher
relationship on its head with both parties acting as equals and
learning from each other.
35. 12. Best Tell-lt-Like-IMs Blog
ITS NOT ALL FLOWERS AND
SAUSAGES, itsnofallfioiversandsausages.blogspot.com.
THE LOWDOWN: A second-grade teacher with the pseudonym Mrs. Mimi
dishes about the crazy side of teaching.
WHY WE LOVE IT: Fantasies of throwing down with that colleague who
rummages through your desk? Horror field-trip moments that have carved
a permanent groove in your mind? Faculty-room shenanigans that rule
your day? Thanks to Mrs. Mimi, we never have to feel alone.
WHY SHE LOVES BLOGGING: Says Mrs. Mimi, "It's comforting to know
that I am not alone in my frustrations."
36. 13. Best Laugh-Out-Loud Blog
REGURGITATED ALPHA BITS, regurgitatedalphabits.blogspot.com
THE LOWDOWN: Anonymous elementary school teacher blogs about the students she
loves and the job she hates.
WHY WE LOVE IT: This blog gives you totally true antics of the elementary school kind and
tips you can really use: Preview "educational" videos before showing and be alert for fourth-
grade make-out sessions! Perfect with a good cup of coffee, when you need to block out
irritating colleagues, and when you could use a good laugh to start your day.
37. 14. U. Best for Media Specialists
TECHNO TUESDAY, blog.cathyjonelson.com
THE LOWDOWN: Media specialist Cathy Nelson provides tips on incorporating library
technology into lessons.
WHY WE LOVE IT: Nelson shares creative research ideas as well as humorous daily tidbits.
WHY SHE LOVES BLOGGING: Says Nelson, "It enhances my ability to be reflective, to see
how I have learned from others."
38. 15. Best for Problem Solving
CLASSROOM SOLUTIONS, blogs.scholastic.com/classroom_solutions
THE LOWDOWN: Hear straight from Scholastic's team of teacher advisors on topics ranging
from reader's workshop to discipline and organization.
WHY WE LOVE IT: AU of the photos and videos! Almost every post features a photo
showing exactly how the teacher advisor implemented an idea in his or her classroom. You
can also subscribe to the posts for just your grade level.
39. 16. Best Substitute Secrets
JUST A SUBSTITUTE TEACHER, kauaimark.blogspot.com.
THE LOWDOWN: "Mr. Homework" tells harrowing tales of the substitute kind.
WHY WE LOVE IT: Let's be honest. Sometimes we'd rather come in sick than call in a sub.
Mr. Homework, however, is one of the good guys. His outlook on the sub life
(e.g., "Sometimes it's not about actually teaching anything") makes us wish he was in our
district.
40. 17. Most Entertaining Math Blog
HOODA MATH BLOG, hoodamathblog.com
THE LOWDOWN: Math teacher Michael Ed Laviteli uses games to teach math.
WHY WE LOVE IT: The word games may conjure images of worksheets with
cutesy pics and fill-ins, but Edlavitch goes way beyond that. His arcade games
with Flash - complete with worksheets teachers can print out - are reminiscent of
old favorites like Pac-Man. Kids will play video games anyway, why not sneak in
some learning potential?
41. 18. Best Classroom Use of Blogs
LEARNING IS MESSY, learningismessy.com/blog
THE LOWDOWN: Brian Crosby discusses how he uses blogging and other
technology in the classroom.
WHY WE LOVE IT: Crosby's creativity can't help but draw us in. He has used
Skype to broadcast, a class visit from Christa McAuliffe's mother and to
communicate with a student who is on home instruction due to leukemia.
WHY HE LOVES BLOGGING: Says Crosby, "It is the strongest resource I have
experienced in 28 years of teaching."
42. 19. Best View of the Inner City
THE JOSE VILSON, thejosevilson.com/blog
THE LOWDOWN: Artist, poet, and math educator Jose Vilson gives the inner city a human
face by blogging about sometimes touchy topics.
WHY WE LOVE IT: Vilson does not shy away from tackling the controversial, such as his
entry about the shortage of black Latino male teachers like himself. He's passionate about
changing education and exposing inner-city reality, and his passion is contagious.
43. 20. Best Blog From Outside the Classroom
TALES FROM THE SCHOOL BUS, talesofaschoolb usdriver. blogspot.co m
THE LOWDOWN: A school bus driver fills us in on the insanity that goes on before students
enter the classroom every morning and after they leave.
WHY WE LOVE IT: We all have to multitask, but try keeping order and driving at the same
time! This blog gives us the dirt - from failing brakes to bus "heathens" like Whiny Girl. This
is a side of school we often overlook!
44. References
A YEAR OF READING, readingyear.blogspot.com
Blogger.com:http://www.blogger.com/tour_start.g, a blog is a personal diary
CREATING LIFELONG LEARNERS, needleworkspictures.com
DIGITAL ANTHOLOGY, di.gitalanthol.ogy.blogspot.com
DOCERE EST DISCERE, docereestdiscere.ivordpress.com
Gelbwasser, M.. (2009, September). THE TOP 20 TEACHER
BLOGS. Instructor
(1999), 119(2), 37-39. Retrieved February 28, 2011, from ProQuest
Education Journals. (Document ID: 1873816341).
INTEGRATING TECH, thespiari70.blogspot.com
45. References
ITS NOT ALL FLOWERS AND SAUSAGES,
itsnofallfioiversandsausages.blogspot.com
HOODA MATH BLOG, hoodamathblog.com
JUST A SUBSTITUTE TEACHER, kauaimark.blogspot.com
LEARNING IS MESSY, learningismessy.com/blog
MRS. CASSlDYS CLASSROOM BLOG
classblogmeister. com/blog.php ?blogger_id = 1337
46. References
PRINCIPALS PAGE, principalspage.com/theblog
REGURGITATED ALPHA BITS, regurgitatedalphabits.blogspot.com
Schuman, L. (1996). Perspectives on instruction. [On-line]. Available:
http://edweb.sdsu.edu/courses/edtec540/Perspectives/Perspectives.html
SCIENCE FIX, sciencefix.com
STEP BY STEP INSTRUCTION ON HOW TO CREATE AND USE A BLOG,
go.blogger.com
TALES FROM THE SCHOOL BUS, talesofaschoolb usdriver.
blogspot.com
47. References
TEACH FOR.US, teachfor.us
TECHNO TUESDAY, blog.cathyjonelson.com
THE JOSE VILSON, thejosevilson.com/blog
THE TEACHING PALETTE, lheteachingpalette.com/blog
YOUTH VOICES, youthuoices.net