Both Sides Now

The Polarization Lab at Duke University has been investigating how social media exposure increases or decreases existing political extremism. I review some of the tools they make available and some of the research they have conducted in an earlier post.

One of their more interesting experiments involves the use of bots they have created to forward the input from moderate liberals and conservatives. They propose that exposure to extremists of either orientation leads to greater polarization, but exposure to moderate positions taken by those with a different position than your own may lead to a lessening of polarization.

I have been following both Twitter bots for several months now. You can participate as well. If you don’t want to participate, you call always search for one of the bots just to see how the feeds from moderates of both perspectives differ.

@Polly4Conserv – for liberals to learn about moderate conservatives

@Polly4Liberals – for conservatives to learn about moderate conservatives

Educators looking for an interesting project might ask students to come up with a system for studying political orientation and apply this system to the two different sets of tweets.

Both Sides Now (with apologies to Joni Mitchell). I guess Phil Collins Both Sides of the Story also works.

Loading

Posted in Uncategorized | Tagged | Comments Off on Both Sides Now

Don’t repeat your passwords

Anyone online is only as secure as the quality of their passwords and even with a good password they can be vulnerable. I pay for LastPass to protect access to the multiple sites I use. I was alarmed to see reports that LastPass users may be vulnerable. The following explanation offers me some relief and I hope the explanation is accurate. Don’t use a password for a password manager you have ever used elsewhere.

LastPass breaches appear due to credential stuffing.

‘A credential stuffing attack is when hackers take username and password combinations leaked through data breaches and attempt to use them at other online services, hoping that some users reused credentials across different sites.”

https://therecord.media/lastpass-confirms-credential-stuffing-attack-against-some-of-its-users/

Loading

Posted in Uncategorized | Tagged | Comments Off on Don’t repeat your passwords

Sal Kahn on mastery learning

Most educators are familiar with the Kahn Academy, but may not appreciate the overall structure of the Academy for student learning. There is a big difference between using the resources provided by Kahn to address a specific need and the use of the curriculum of the Academy and the focus on mastery learning.

Here is a short post from EdSurge that contains an audio interview with Sal Kahn. The focus on this post is mastery learning. Mastery learning has been a personal focus since the late 1970s. As I became interested in technology, I was convinced that technology provided opportunities to make mastery concepts practical. Here is my take on mastery learning (more about the origins and components) and how it relates to the model in Kahn’s approach.

Loading

Posted in Uncategorized | Tagged | Comments Off on Sal Kahn on mastery learning

Tools and tactics tutorials

As a class project, I have students in my graduate instructional design class generate tutorials for educational relevant apps or online services. These tutorials may offer useful information to K12 educators interesting in exploring new tools for their classrooms.

Tools and tactics

Loading

Posted in Uncategorized | Comments Off on Tools and tactics tutorials

Special tech recommendation

I did not intend a Christmas Day post, but my youngest granddaughter received a present I thought deserved recognition.

I have had the opportunity to explore several cameras for young children over the years and all have been disappointing. Inexpensive tech has improved a lot. If the lighting is good, the images this gamera generates should give the child a feeling of accomplishment The camera stores digital images or prints photos. Printing is different from the resurrection of the Polaroid approach which is just too expensive for kids. The Amazon listing for the camera – Instant Print Camera.

Happy holidays

Loading

Posted in Uncategorized | Tagged | Comments Off on Special tech recommendation

Top posts of the year


I write in three blogs with different orientations. One blog is intended to offer longer tutorials and comments on edtech issues, one focuses on shorter posts related to edtech issues, and one gives me an opportunity to comment on other topics. The following posts were visited most frequently – it is a strange mix. Most folks access my posts as the result of a search and this method of access influences the type of content that is viewed.

Amish Greenhouse Trip – the most frequent access was to a post I authored several years ago even though I posted on the same topic more recently. The post offers a pictorial and text description of our trip to the Amish Greenhouses in southern Minnesota. This is an example of search access. People want to make this trip to purchase plants for their gardens and I happened to have written one of the few online descriptions of these greenhouses.

Ideas for concurrent teaching – another hot search topic. This one for educators. What do you do when you have some students in person and some students online.

Hotspots for Google slides – I can come up with no easy explanation for the interest in this topic. Maybe it just sounded intriguing. It does describe a hack most folks would not consider.

Interactive media bias chart – a sign of our time. Which news sources are most biased.

Grabe greetings – my message for the holidays. I posted a link from Facebook and I have lots of relatives.

Loading

Posted in Uncategorized | Comments Off on Top posts of the year