RSS

Category Archives: Quality Control

Coding, A NEW Trend In Education And A BIG Responsibility

Coding, A NEW Trend In Education And A BIG Responsibility

.

Collaboration and Coaching

.


Before Starting With Coding / Proactive THINKing!

.

Proactive THINKing

.

Before Starting With Coding WE MUST know first the IMPORTANCE and the big RESPONSIBILITY about ===> Coding <===! Responsibility while Coding, sounds STRANGE, isn’t it!?

Well, I think the BEST way to explain YOU WHY ===> Proactive THINKing and RESPONSIBILITY is a MUST <=== in Education, is to show YOU some examples on WHAT happens WHEN code goes wrong!

.

WRONG Code Accidents

Click the image to go the article.

.

Related links:

programmerman-animated

AND as YOU know me, mostly some #FUN video in it 😉

.

.

 

Remember about the basic Physics!? Any action has a counter-action OR ===> Isaac Newton: For every action, there is an equal and opposite reaction <=== Might be GOOD to remember THAT and to tell it to YOUR students (learners) 😉

And WHAT about ===> Copyright!? <=== DON’T FORGET to tell YOUR students, learners, about it as well. The above mentioned is A MUST as it will develop ===> Critical THINKing and Proactive THINKing <===!

SO… NOW as WE discussed about WHAT NOT TO DO, let’s GO for trying out how WE can give courses about ===> Coding <=== 😉

.


Coding Introduction

.

.

Coding is the 21st Century skill. Coding enhances creativity, teaches young people to cooperate, to work together across physical and geographical boundaries and to communicate in a universal language. Technology is part of our life, and coding brings it closer to you!

Check ALSO, click the image below, please, to go to the proposed resources from the “EU“:

.

EU Coding Resources

.

.

Another Initiative In Europe: 

.

KODUKUP

 Click the image to access the website, please.

.

In Europe Five-Year-Old will learn ALREADY about Coding, check article below, please.

.

Coding and CyberSecurity

.Read more (A MUST) by clicking the image.

.


Play The Cyber Security Lab To Learn About Coding AND Cyber Security

.

CyberSecurity Lab Game

Click the above image to access the game, please.

.

.


.

.

.

Interesting Kits are ALSO the KANO, check below, please.

.

KANO Coding Kit

Click the image to access the full article. 

.

Interesting Kits are ALSO the Raspberry PI and Arduino, check below, please:

.

rasberrypi_primary-100409935-large

 

.

RaspBerry Pi

 Click the image above to access the article, please.

 

littlebits_arduinostarterbundle-100268193-large

.

.

WunderBar-IoT

 Click the above image. please, to access the article.

.

FlowPaw

Click the above image. please, to access the article.

 

Learn more:

.

Coding events in Luxembourg (Europe):

.

Concerning Wearable-Wednesday’s, here below some tips:

.


WHAT Kits To Use For Coding?

programmerman-animatedWell, YOU have the possibility to use Kits without the use of a computer and Software-Kits who run on the computer, as well as special software for the kids and games from where the kids can learn coding.

Let’s START with the Kits,see non-exhaustive list below, please:

.

.

games for coding

 

.

Learn more:


iPad Apps for Programming/Coding

Check following links, please:

 

Follow ALSO on Twitter ===> https://twitter.com/CodeWeekEU <===

.


I Need NEW Ideas, WHERE To GET Them!?

Well, with the internet that is very easy, one needs ONLY to make some research on here THEY are 😉 Look especially on YouTube Channels…

And WHEN going to ===> #DeepTHINKing <=== YOU might like the following 😉

  1.  Ideas for a more secure Internet-part2/IT-Security Scouts
  2. Ideas for a more secure Internet-part1/National Security Day as a Family Day

  3. Ideas for a more secure Internet-part3/Dangers of storage devices

.

Coding & MakerSpace Ideas on Pinterest

 Click the image to access the resources.

.

Some more ideas below…

.

Coding & MakerSpace Ideas

Click the image to access the resources.

.

 

Some more ideas below with LEGO…

.

LEGO

Click the image to access the resources.

.

.


WHAT about Girls In Tech (Coding)?

Concerning <===> Girls in Tech <===> did YOU know that there were already a LOT of celebrities (today) in programming (coding) in history?

Learn more:

.


 

.

Stay tuned for next blog post(s) 😉

.

 

Keywords necessary for me to create this blog post: Awareness, Responsibility, Cyber-Security, accidents because of wrong code, naivety, ignorance, wrong self-estimation, selfish, egoism, NO empathy for OTHERS when making a mistake, risks, risk of failure, Privacy, life attitude, ETHICS, moral, Copyright, Commercial ETHICS, FUN-Society,

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Maker Space | A New Trend In Education And A BIG Responsibility

Maker Space | A New Trend In Education And A BIG Responsibility

.

Collaboration and Coaching

.


WHAT is Maker Space?

Chat iconI will use the text from ===> http://makerspace.com/ <=== as it describes well WHAT it is: To describe them simply, makerspaces are community centers with tools. Makerspaces combine manufacturing equipment, community, and education for the purposes of enabling community members to design, prototype and create manufactured works that wouldn’t be possible to create with the resources available to individuals working alone. These spaces can take the form of loosely-organized individuals sharing space and tools, for-profit companies, non-profit corporations, organizations affiliated with or hosted within schools, universities or libraries, and more. All are united in the purpose of providing access to equipment, community, and education, and all are unique in exactly how they are arranged to fit the purposes of the community they serve.

Makerspaces represent the democratization of design, engineering, fabrication and education. They are a fairly new phenomenon, but are beginning to produce projects with significant national impacts. [END text from http://makerspace.com/]

Different Maker spaces:

.

.

Find out what WE are making in my country Luxembourg in Europe:

.

.

 

Learn more:

.

AND as YOU know me, mostly some #FUN video in it 😉

.

.

.


Learning About Electrical Circuits, Electronics Circuits AND The Difference Between Both

There is a BIG difference between “Electric Circuits” AND “Electronics Circuits” which MOST educators and teachers DON’T have understood YET!!! SO… Let US learn about it to do it RIGHT, so that OUR students, learners will learn the RIGHT terminology 😉

.

Here below what’s WRONG!

.

Design electric circuits

.

Potentiometer

 

 

.

And here the learning space where educators, teachers SHOULD have a look on to KNOW and understand about it!

.

All About Circuits

Click the above image, please, to access the article.

 

.

What Is the Difference between Electronic and Electrical Devices.

Click the above image, please, to access the article.

 

 


3D-Printing, Copyright And Trademark

Monitoring

.

Lots of Makerspaces are following THE TREND with 3D-Printing and have ALSO their own 3D-Printer. BUT, I have seen that much 3D printed stuff from them which I am sure about that they infringed Trademark and Copyright laws! SO… To make sure that YOU will NOT become in touch with any court in YOUR country for law infringement, follow the steps below, please.

.

.

Check the advice below, please:

 

GO AWAY from ONLY using the Maker Space a couple of hours and make it 100% in the LEARNING! Give the students (learners) the possibility and opportunity to be 100% a maker while working together with THEM in a TEAM and… To be updated…

.


Safety First And Naivety Beside! Responsibility At Any Moment!

dos-and-dontsThe EVER first thing to think about while building up a maker Space is the Safety of YOUR students (learners)! Just starting it without thinking that way is purely NAIVETY! WHY do I write in such a strictly form here!? Well, I have seen on the internet through Social Media workstations who don’t respect at ALL these Safety rules and even bring in danger the students and learners! I will show YOU the DOS and DON’TS below.

Tools

Every craft has its own tools. Especially when WE are working with electricity and electronics, there are special safety rules to follow, such as:

  • Every tools MUST be isolated to avoid an electrical shock!
  • When soldering, there MUST be an ventilation to extract the toxic smoke!
  • Drinking and eating is prohibited!
  • ESD, Electrostatic Discharge MUST get avoided! It will destroy the electronic circuits!

.

 

DOS and DON'TS SOLDERING

 


.

Appropriate tools

 


.

Soldering and ESD

 

.

 

ESD-Electrostatic Discharge ProtectionClick the above image to access the article, please.

.

Where to shop, non-exhaustive list?


 

MakerSpaces DONT’s

 

MakerSpacesDONTs-blank-wire

.

MakerSpacesDONTs-Conductive-pieces-on-table

 

.

.


.

.


.

WHAT YOU SHOULD know about SOLDERING!

.

 

Soldering Safety

 Click the image to download the PDF.

.

Solder Fumes-Health-Danger

Click the above image to access the article, please.

.

.


.

Soldering Safety

Click the image to download the PDF.

 

Related links:

 


Soldering And Coding

programmerman-animatedFind below, please, my non-exhaustive list of quality manufacturers who provide different kits for different electronic and programming projects.

.

.

 

Related Links and Kits:

.

Check ALSO my blog post about Coding:

 


Safety Control By Government

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01In certain countries, especially in Europe (Germany and Luxembourg to name a few) there are strict Safety Control by specialized companies of any working places and strict rules to follow! Check below, please:

.

In case of a doubt and to make sure that YOU didn’t forget anything about safety rules, I suggest to YOU to give them a call for further information and certification. DON’T FORGET: YOU and YOUR school are responsible for YOUR students, learners!

.


Evolution Of Educators And Teachers!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01This is NOW a complaint which I make, seriously! It’s a WAKE-UP call actually! Educators and Teachers have STILL behavior as usually in the OLD century where the Social Media wasn’t existing yet and where THEY didn’t get (THEY got, BUT who cares…) criticism which everybody can see and follow. NOW through the Social Media Twitter and Facebook, as well as on others,  people will watch in real time and have the possibility to act and react.

THEY didn’t understand at all about the ===> #LEARNing By Doing <===, THEY are STILL on “YES” and “NO”, “Black” and “White”, “Day” and “Night”…

Real World and Virtual World ===> posting on Social Media ===> Responsibility and Reality!??? Naivety as NO knowledge about PracTICE, Praxis and publishing it as everybody worldwide could see it without being right = NOT professional and DANGER for health!!! There is a MUST for a Mind Shift, as Teachers and Educators YOU can’t just say that YOU are able to teach anything! There are specific areas where YOU MUST ask experts about the trade. There is knowledge about Safety and knowledge about Cyber-Security necessary for certain specific areas such as “Coding” and Makerspaces!

A Proactive Thinking is a MUST!

Proverbs: “Schuster, bleib bei deinen Leisten.” => “A cobbler should stick to his last” <= !

DON’T let people from ( ) about ! OR at least UP with !

21 Things Every 21st Century Teacher Should Do And Keep Their Sanity!  Invite a local !

.

Questions WHO YOU SHOULD ask YOURSELVES:

  • Do I know ALL the safety precautions?
  • WHERE can I get ALL the necessary information about it?
  • Are THERE any dangers for my students, learners? Which ones!?
  • As it is Praxis oriented and I don’t know much about, SHOULDN’T I ask for an EXPERT!?

.


I Need NEW Ideas, WHERE To GET Them!?

Well, with the internet that is very easy, one needs ONLY to make some research on here THEY are 😉 Look especially on YouTube Channels…

And WHEN going to ===> #DeepTHINKing <=== YOU might like the following 😉

  1.  Ideas for a more secure Internet-part2/IT-Security Scouts
  2. Ideas for a more secure Internet-part1/National Security Day as a Family Day

  3. Ideas for a more secure Internet-part3/Dangers of storage devices

 

.

Coding & MakerSpace Ideas on Pinterest

 

Click the image to access the resources.

.

Some more ideas below…

.

Coding & MakerSpace Ideas

Click the image to access the resources.

.

Some more ideas below with LEGO…

.

LEGO

Click the image to access the resources.

.

Great resources with tips and tricks as also projects in specialized magazines:

.

c-t-hacks-4-2014-make-7c9

.

.

.

.

.

Click the image to access the resource.

.

.

.

.

.

.

.

 

.

 


FeedBack From The Readers

Here below my bragging’s about WHAT my readers say:

.

FeedBack

Click the image to access the source.

.

 

 

Keywords necessary to create this blog post: Copyright, Safety, 3D, 3D Printing, Health, toxic, Practice, Praxis, Edtech, Technology, Theory and Practice, QUALITY, RESPONSIBILITY, Proactive Thinking, Critical Thinking, wrong tools, right tools, coding, soldering, digital lab kit, TÜV, Inspection des mines et travaux, Safety Control,

.

.

Stay tuned for next blog post(s) 😉

.

 

Twitter Chat: Security risks SMBs face

Twitter Chat: Security risks SMBs face

.

Learning basics of IT-Security and Cyber-Security

.


On Monday, June 9th there will be #cyberSAFEchat who will explore the security risks SMBs face during every phase of growth and learn how to best protect against these threats. The hour-long Twitter chat will address the following key questions:

  • Q1: What security risks do SMBs need to consider when starting a business and why?
  • Q2: How do these risks change as the business grows and why?
  • Q3: How can lapses in security impact a SMB?
  • Q4: What tools and tips would you recommend that SMBs use to secure themselves, their employees and their customers?

I got invited through Twitter by @CSID:

.

Twitter Chat SMB and CyberSecurity

.

After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy! So here we go:

.

Q1: What security risks do SMBs need to consider when starting a business and why?

programmerman-animatedWell, first of all SMBs don’t have to forget that they deal with employees and that THE weakest link in the security chain is the human!

.

Please check my following blog posts who explain in detail:

.

As nearly everyone is using a smartphone today so there is ALSO a MUST to consider a “BYOD-Policy” (Bring Your Own Device) as the use of smartphones could be a BIG security risk to the SMB’s as MOST employees don’t have any knowledge about the basics of Cyber-Security, even that there smartphones and/or tablets, laptops could be infected with virus, trojans, keylogger

Please read my blog post about BYOD below:

.

Another risk to consider is the webpage of the SMBs! A webpage can be a very BIG risk when it is compromised and it would infect the computers and BYOD stuff from visitors (employees, customers and other…)!

.

And didn’t WE forget something!? YES, WE MUST consider ALSO so called “Third Party Applications” as bugs in programming code of software are ALWAYS inevitable! Nobody is perfect! If that would be the case, ALL programs would STILL be on version 1.0 😉 Right? Got it? Check ALSO, please:

.

As a reminder: What are SMBs?


Q2: How do these risks change as the business grows and why?

.

greatest security threat to organizations

Image credit ===>  http://www.tripwire.com/state-of-security/security-awareness/security-its-us-vs-them-or-is-it/ <===

.


Q3: How can lapses in security impact a SMB?

1ibdy1vf6wghd-n05dgl-aigainformation1As already mentioned above in Q1, once the website (webpage) is infected then any visitors, employees and customers included could get infected by the simple visit of that website. it is called “Drive-by download“! WE MUST also consider “Data-Breaches” where ALL the information of the customers and employees would get exposed on the internet! All of the above mentioned will NOT be a funny situation as it brings a BAD reputation to the SMBs, possible legal actions against them and a loss of customers, even perhaps a bankruptcy…

.

drive-by-download

Image credit:

===> http://www.microsoft.com/security/sir/glossary/drive-by-download-sites.aspx <===

.

Related articles:

.


Q4: What tools and tips would you recommend that SMBs use to secure themselves, their employees and their customers?

sharing-iconFirst of all: I recommend to train the employees about Cyber-Security and the risks that the SMBs encounter through involuntary actions from their employees (ignorance) and/or their BYOD stuff! This training should include, see my following blog posts, please:

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Learn more about ProactiveTHINKing:

.

Concerning tools, WE should consider different ones:

  • Webpage security
  • BYOD
  • Server Security

Here a non exhaustive list of a variety of tools:

Described in one word, I would say that WE ALL, SMBs and any user SHOULD get used to a ===> Cyber-Hygiene!!! <===, read my blog about, please:

.

CS_Infographic_SMB2014_FINALweb3

 

Infographic credit ===> http://www.csid.com/2014/06/cybersafe-webinar-series-recap-smb-security-for-every-phase-of-growth/ <===

.

Useful links and providers of Cyber-Security solutions:

 

This blog will get updated after the chat tonight, where I will include the transcript as any other useful information…


The Transcript From The Chat Tonight

So, as any GOOD Twitter Chat makes a “Transcript”, this one made one ALSO, which YOU can find below.

.

#cyberSAFEchat transcript

Please check the whole transcript here ===> https://storify.com/CSID/cybersafechat-smb-security-through-all-stages-of?utm_campaign=&utm_medium=sfy.co-twitter&utm_content=storify-pingback&utm_source=direct-sfy.co&awesm=sfy.co_jkFv <===

 


Final word

chat iconA security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior…, and ALSO  the bugs in programming code of software!

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Related articles:

Stay informed about what is happening on a daily base about Cyber-Security to get prepared for the UNKNOWN! It’s the letter “I” in “ICT“, which means “Information“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “C“, which means “Communication“! Inform YOUR employees and ICT-Staff as soon as possible, remember that in the “Security Chainanyone MUST be strong!

===> THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! <===

Read my curation:

.

Keywords for this post: CASES, my articles, CyberSecurity, BYOD, Privacy, Awareness, Training, CyberHygiene, Policies, Reflexes each week, reminding reflexes, human behavior, weakness, security chain and human, Naivety, HowTo ideas, Government help, FREE courses from Government, PHISHING, Spear-Phishing,

.

Stay tuned for next blog posts, some are already in preparation 😉

.

 

PracTICE: Put Students In The Drivers Seat | How To!?

PracTICE: Put Students In The Drivers Seat | How To!?

.

Evolution of Education: Wordle Logo

.


PracTICE: Put Students In The Drivers Seat | How To!?

Let us first have a look on WHAT is needed in the 21st Century from OUR Students, check the screenshot below, please.

.

5 Minds For The Future

.

SO… When YOU analyze the above mentioned, you must agree that MOST of it could get taught in a project together with the students, a project where THEY have THEIR voice and THEIR responsibility. I suggest (idea), to let the students run themselves with a coach on their side an “Advisory Board” for Internet Safety and Cyber Security. Please check my blog post about it below:

.


Multidisciplinary Learning and Teaching

sharing-iconFirst of all: I hated since the beginning of my learning adventure in my youth (ages ago…) the linear learning. Thus meaning: first learning module A, then module B, module C and so on… It sounded stupid to me as a 14 year old (45 years ago…) and STILL sounds THE same today! At the time, in college, in mathematics WE learned about the “Set Theory” and I was asking about the WHY WE as students SHOULD learn this, as I didn’t (at that time) see its importance. None of the teachers could explain to me, THEY all just said: it’s on the program, on the curriculum! BTW: when YOU have a look on Wikipedia and check different languages (EN, FR, DE) you will see that THEY didn’t understood it not yet as it is badly explained… Giving credit to the German part of Wikipedia “Mengenlehre” as they at least show practical examples… The French part “Théorie des ensembles” doesn’t show even any images and is pure theory :((( BUT, the French translation of the word “Set Theory” explains about WHAT it is: “ensembles”  which means “together“, things which have something in common. It’s ONLY years later after school left, that I understood the importance of the “Set Theory” when I was looking myself to find an answer on reflecting on how to resolve problems, to find their common points, you know “If then, go to, else…”…

I even trained my brain to think that way, yes that is possible, and when I became an instructor and giving courses to teachers, adults, seniors and teens I used it even more. and that is also the way YOU should teach your students, it helps THEM to become “Critical THINKing” and “Proactive THINKing” persons.

Learn more:

 


Youth Leadership, A MUST To Prepare THEM For THE Future, Let THEM HELP To Build It

programmerman-animatedWHY is Youth Leadership important? Please check below and read the full article from . As a narrative researcher, Marilyn studies how human stories and experiences are linked to learning and meaning-making. Her recent study, Civic Learning at the Edge, discovered how caring relationships with adults and transformative learning experiences during adolescence fostered the development of young people who became engaged in social and environmental causes. Marilyn Price-Mitchell is a Fellow at the Institute for Social Innovation at Fielding Graduate University in Santa Barbara, CA. She has a Ph.D. in human development and an M.A. in human and organizational systems from Fielding. Her undergraduate degree, in sociology, comes from the University of Michigan. Her research focuses on child and adolescent development and youth civic engagement. She is the co-founder of the National ParentNet Association, a nonprofit that builds family, school, and community partnerships that support youth. She writes ALSO  as an expert on “Psychology Today“.

.

Youth Leadership

 

Click the above image, please, to access the full article.

 

 

Related articles from my curation:

 

 

Put Students In The Drivers Seat

 

Click the above image, please, to access the complete article.

.


THE PracTICE: some ideas on the how to

Well, as WE hear more often the word “Digital Citizen” and as it becomes imperative for the 21st Century, what else could be better than to use it to build up from there. Please check my blog post below, who explains in detail:

 

.

Generation YES-Digital Citizenship

Click the above image to access the complete article, please.

.

Some ===> Critical THINKing <=== below, which I published through Twitter posts:

 

ScreenHunter_03 Jun. 04 23.36

.

Learn more:

 

 

Well as YOU have seen in my Tweets (Twitter posts) above, I mentioned different “tools”, such as “MindMaps“, “FAQ’s“, the “Set Theory“, PBL (Project Based Learning)… Use them wisely and be a “Coach” who is guiding YOUR students, learners for ===> DeepTHINKing and DeepLEARNing <===.

And as a reminder, a video who shows BEST about “Engaging Students“, below 😉

.

.

 

Keywords for this blog post: bad orientation, bad teachers, NO Professional Development, elementary school, primary school, time plays a BIG role, LE MIEUX APPRENDRE, books, 5 Minds for the future, Howard GARDNER, Team work, adjusting, analyzing, diagnostics of learners, FAQ’s list, working TOGETHER with the learners, engagement of learners, Set Theory, Venn Diagram, teacher is a guide, a coach, Youth Leadership, Youth helps building THEIR future,

.

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

.

Evolution of Education: Wordle Logo.


ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

programmerman-animatedGovernment and Education MUST be digital illiterates when NOT accepting that it is time for TEACHing the basics of Cyber-Security! By reading the reports of experts from the professional companies from Cyber-Security protection software, one MUST accept the facts that Cyber-Crime is evolving at a very rapid rate! Cyber-criminals learned How-To trick the users and THEY are inventing every day NEW tricks to trick THEM (US ALL), BUT Education and ALSO the Government are NOT YET ready to counter such actions! 

WE have to ACCEPT that (that are facts!!!)  20% of all malware ever created appeared in 2013 and THAT there are 31.53 % infected computers worldwide!!! That MUST give people a kick for Deep-Thinking! In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Check article below, please:

Isn’t it time to introduce in Schools as a MAIN core ===> LEARNing the basics of Cyber-Security <=== as WE are ALL using computers and ===> BYOD <=== (Bring Your Own Device) and actually ALSO using Mobile-LEARNing and e-LEARNing!? WE can’t anymore bury the heads in the sand and NOT wanting to see the problems! THE reality is there and it can’t get fought ONLY by giving the IT-Admin of the school THAT responsibility, that is pure NONSENSE and a Middle Ages mentality, excuse-me, please!

==========> WE are ALL responsible for a secure internet! <==========

.


How Could This Be Realized And Up From Which Age?

programmerman-animatedI suggest to teachInternet-Safetyup from the age of 5 years old and the basics ofCyber-Security to the kids up from the early age, 8 years old! THEY would be able to understand how to get used to reflexes! These reflexes SHOULD get repeated once a week. I suggest the Friday as I started it ages ago already on Social-Media Twitter. It is called the ===> Friday Security Check Day <=== and the Hashtag for it is ===> #FSCD <=== SO, as it is under the age of the terms of use from Twitter, parents need to get involved as well to help THEIR kids to become GOOD “Digital Citizen” and by the same way the parents will learn also and with that COLLABORATION WE are on the winning side to make the internet a more secure place! Everybody will profit from it 😉

======> Safer Internet Day: Children need educating from age of 5, say campaigners <======

Read more:

.

 

Digital-Citizenship-infographic-620x965

Image credit ===> https://magic.piktochart.com/v/49853c8b-b418-406a-b979-0b240ca62352 <===

Check upper corner on right-hand side, there is “Digital Security” mentioned 😉 It should actually be ===> Cyber-Security <===

BUT anyway, it is THE BEST explication I ever have seen about “Digital Citizenship“!!!

 


SO… WHAT’S About Basic Cyber-Security Knowledge NOW As It Is Mentioned As Well!?

programmerman-animated.

That’s actually the easiest part of it, MOST of YOU think that it is the MOST difficult one, BUT it isn’t at ALL 😉 It’s ONLY based on reflexes and a one-time installation of software on YOUR computers (Smartphones included…).  Please check my following blog posts and YOU will see how easy it is:

 

Related articles, YOU might check as well for BETTER understanding (secret TIP):

.

==========> A Proactive-THINKing and Critical-THINKing will get created which is a MUST in a modern, technology driven society!!! <==========

.

YOU should ALSO be interested about ===> Youth Leadership and Students Voice <=== where YOUR students, learners will take themselves the responsibility for THEIR future, check below, please:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.


 

.

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 19, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Facebook, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Quality Courses, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags

.

Evolution of Education: Wordle Logo.


WHAT is Curation And What Is NOT Curation?

.

go through worse to get to better

.

.

Most of people know WHAT “Aggregation” is, it is the simplest way to share links, YOU just forward it! BUT that is NOT “Curation“, most people didn’t YET understood this and using “Curation Services” as platforms for ONLY sharing links! That is a lazy attitude, sorry to say this!!!

Curation needs a bit effort and people, especially Educators and Teachers, need to take THEIR time to evaluate the found information by giving it THEIR insight(s) to share with OTHERS! This is very IMPORTANT, as the human can so give BETTER results as a search engine (Google, Yahoo, and others…) as the proposed results are human based, reviewed links and articles.

.

SO… Knowing NOW what Curation is NOT, let us find out WHAT CURATION IS, please check the image below, who explains it BEST.

.

5-Steps-for-Content-Curation

Image credit ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=basic+guide <===

.

I invite YOU also to check my Curation about Curation below, please:

.


How-To Use Scoop.it To Get Out BEST Curation From It

1ibdy1vf6wghd-n05dgl-aigainformation1First of all, please check the FAQ’s from Scoop.it itself to find out the basics of using Scoop.it here:

A question I am getting asked very often: WHY SHOULD WE trust YOU!? Well, that is a good question and it deserves ALSO an answer. Let me brag a little bit (sorry), a MUST to explain WHY: I started with Curation on Scoop.it on ===> waiting 2 find out <=== and I got honored as ===> Lord Of Curation <=== as well as I got awarded by a ===> Rewarded PRO account <=== from Scoop.it. I hope that this will give YOU some trust on what I am posting here 😉 Check below, please to find out:


BUT, let us go NOW for the essential, HOW can WE do BEST Curation? 

Well, it is actually NOT that difficult at all, BUT WE need to invest a bit of work 😉 With a lazy bone attitude WE will not come far, sorry. Good results need ALSO good preparation as well!

To do this, WE need first to understand (as mentioned already above) that WE have to give OUR insight when curating an article, thus meaning: WE need to read the article and to build OUR OWN view about it first, then curating the article and ALSO to publish OUR insight about it! Check below on practical examples, please.

Screenshots in English and in French about GREAT “Insights” from members of my “PLN” (Personal [Professional! Learning Network) to show YOU some practical examples which are worth to copy (the way how they did, not the text…) 😉

.

curation top tips

Image credit ===> http://curation.masternewmedia.org/ <===

.

I will give you some visual examples below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry…), we go straight to the point…

.

Curation insight-1

As you can see in the above screenshot, there is some text and also some links linking to similar content… The above screenshot is taken from ===> http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers

.

.

BUT the above shown isn’t YET enough! HOW will YOU find back later ALL YOUR curated articles and/or when YOU use the search engine in Scoop.it, HOW will YOU find other interesting curated articles? YOU need to index YOUR curated articles and this is done by the so called “Tags“.


The Tags And Their Importance

Let us first check about WHAT Scoop.it itself tells us about the “Tags“, check image and link below, please.

.

Scoop.it-Tags

Image credit ===> http://feedback.scoop.it/knowledgebase/articles/92998-6-6-3-how-can-i-manage-edit-delete-tags- <===

.

WE will look at some OTHER practical examples below as well.

Once built up some topics with your curation, you have already some articles curated under the same “Tags

What are “Tags“?

.

Tags in Scoop.it

.

In the above screenshot you can see used “Tags” from our example from http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers. You will remark that there are a lot, and that should be as you will better find back the curated article, as well as there will be a better ranking in the search-engines…

.

Learn more about the “Tags” from Scoop.it here:

.

Having created your “Tags” on ALL your curated articles you are able NOW ALSO to post Tweets on Twitter with a specific “Tag”, see example here:

===> #Update YOUR #knowledge and/or get ready 4 #learning about ===> #Curation <=== Check ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation

.


Re-Scoops And Their Importance

SO… WE were talking a lot already about the so called “Tags” in above mentioned content, BUT WE are coming back again to THEM, sorry 😉 Scoop.it allows it to “Re-Scoop” a curated article, thus meaning: taking over a curated article from somebody else curation to YOUR own curation, which is actually very easy to do with ONLY two (2) clicks. YOU might see on Social-Media Twitter people who are sharing a curation and that one could fit YOUR interests as well as YOU would like to have it ALSO in YOUR curation TOPICS, BUT HOW-TO do: check screenshots below, please.

.

Re-Scooping-1

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Click on that proposed link then and wait till the curated article on Scoop.it appears. NOW click on the green buttonScoop.it!” as shown in above screenshot.

YOU will get directed NOW to YOUR own Scoop.it account and YOU could chose onto which TOPIC YOU would like to save it, as shown in below screenshot. Make YOUR choice and save it.

.

Re-Scoop-Scoop.it-2

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Once selected YOUR chosen TOPIC YOU will see this, see pic below, please:

.

Re-Scoop from Scoop.it-Curation

.

===> Your post has been successfully published on “Link of YOUR chosen TOPIC” <===. Click NOW that link which will open the chosen TOPIC page.

.

Re-Scoop with Scoop.it and Tags

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Check out ALSO the video about it below, please:

.

.

NOW comes the moment of truth, did the curator from whom YOU made the re-scoop brought in the “Tags“? YOU will see this by ===> check screenshot below, please.

.

Tags_in_Scoop.it

.

As the MOST of people who make curation didn’t really understand the importance of TAGS, YOU probably will see this case empty or not really well used. The above screenshot is from my own curation and shows a lot of TAGS, as it should be. Let me explain a bit about WHY:

As I am multilingual, so I curate in English, French and German, that’s why YOU see also the “Tag” => English <= which I use when the curated article is in “English”. If the article is in French, I will “Tag” it with => Français <= and when it is in German, I will “Tag” it with => Deutsch <=. So I can find back easily my articles by category (Tags). The same for the other “Tags”, YOU need to chose them very wisely, as they will be a great help for later when YOU want to share multiple articles under ONLY one “Tag”, check example below, please:

.

TOPICS: articles regrouping with Tags

Check out ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=country <===

.

Click the image above to find a practical example on How-To use the “Tags” to regroup different articles into ONLY one “keyword“. This is very IMPORTANT when YOU want to share those curated articles on Social-Media, like Twitter. Here below one example which I used on Twitter, see screenshot, please.

.

Using regrouping-Tags on Twitter

.

As YOU might see, I used the same link as in OUR mentioned example above. YOU can EVEN use Twitter then to ask YOUR Learners and Students above a chosen TOPIC, like I did 😉 And the right answer came straight, thanks 🙂 This is then ALSO a NEW possibility to propose to YOUR Learners and Students where YOU propose THEM lots of different articles regrouped under ONLY one “Tag”, BUT being part of a certain TOPIC… Start NOW for ===> Deep-THINKing <=== on How-To YOU can use it in YOUR courses 😉


PKM-Personal [Professional] Knowledge Management

By going into ===> Deep-THINKing <=== YOU might have found already that the right use of the “Tags” gives us ALSO another positive side affect, WE can use Curation combined with well organized and thought “Tags” as OUR ===> PKM <===!

WE will NOT discuss here,as I created already a blog post about it. Please check below:

.

Keywords for me to realize this blog post: Curation, Scoop.it, FAQ’s, Tutorial in depth, Tags, rescooping, SEO, NOT aggregation but Curation => difference <=, insights, PKM, importance of PKM, sharing Responsibility, sharing QUALITY, related links, investing first time to save time later ==> PKM <===…

.

Stay tuned for next blog post(s) 😉

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

.

Wordl Logo Malware-Adware.


What Is Potentially Unwanted Programs (PUPs)? And How-To Remove Them.

programmerman2Potentially Unwanted Programs (PUP)” are a piece of software that is also downloaded when a user downloads a specific program or application. THEY are similar to malware in that it will cause problems when it is downloaded and installed. THEY can be very embarrassing as one doesn’t get rid of them with normal tools, one needs definitely to use special tools to remove them.

Freeware publishers offer their products for free, but bundle them with PUPs in order to earn revenue and users are unaware of these additional installations because ===> they do not read agreements thoroughly. <===

WE will take an practical example while WE are downloading a specific FREEWARE program and discuss on it on How-To. Here below on example where YOU MUST take care when downloading FREEWARE:

.

PUPS-1

.

As YOU might see in above screenshot there are pre-installed PUPs integrated, uncheck these boxes before YOU click the “Next” button!

Once the software installed, I recommend to shut down the PC and to restart it. If there is STILL a PUP on YOUR PC YOU will see it then! BUT, it isn’t a 100% sure way to know if so, BETTER is to install a FREEWARE program (without PUPs) to check the PC, find THEM and to remove THEM! WE will see this in the section below…

.

Related links to PUPs:

.


How-To Check And Remove PUPs On My PC?

1ibdy1vf6wghd-n05dgl-aigainformation1I tried out a lot of solutions over the years and this one, the one WE will describe below, gave me the best results to remove ONLY the PUPs! WE will discuss, in an other section as well, How-To prevent that PUPs get installed. SO, before installing and running the test of that program, let me give YOU an advice, please: depending on how many programs YOU have installed on YOUR PC the test and removing process could take about 30 minutes; the time YOU can’t work anymore with YOUR PC. Make sure when YOU do this task to have foreseen something else to do. Some possibilities are, running the program before a meal, a shower, before shopping, and… YOU decide 😉 As WE are using the download page from Bleeping Computer, I will use their text as well…

BleepingComputer Review:

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.

So let us go now and download this program at following address:

Once having installed the program and started it, it will look like this (see screenshot). YOU don’t have to fear as well to lose some programs as the program creates ALSO a “Registry Backup”!

.

jrtcmdsm

.

As mentioned already above, it will take time, so wait and see 😉 YOU will get later provided a detailed report about what was removed, report which YOU could save, see screenshot below, please.

.

JRT Report

.


How-To Prevent The Installation Of PUPs?

SO… NOW WE know How-To remove those unwanted, stressing programs, BUT doesn’t there are existing programs who help us to protect against those PUPs? YES, there is actually one very good program existing since ages and STILL developed, who makes a great job on preventing and ALSO on removing PUPs, Adware, Spyware, and… It is called “SpyBot Search&Destroy”

Spybot for private use

Why use the Free Edition?

If all you require is to be able to scan and remove malware and rootkits from your system. Or if you want to protect your PC by immunizing your browser and hosts file, the ‘Free Edition’ is the choice for you. If you are a more experienced user you can also check various ‘autostart’ locations using the ‘Startup Tools’. Spybot 2 can scan single files or specific folders and unlike other software it doesn’t matter if the file is located on your local drives or on a network share. Spybot 2 comes with its own whitelist which helps to identify if files are legitimate or not. This useful addition helps to speed up the scan. Even though this fully functioning product is free of charge you can still get free support by emailing our support team.

SO… Let us go to download it from the original website of its creator here:

I recommend to use the FREEWARE version, but anyway YOU might chose what YOU want…

SO… Once installed it will look like this, see screenshot below, please.

.

Spyware Search&Destroy 1

.

Once started, the first step to do is to look for up updates by clicking on the button “Search for Updates” (see screenshot). Once the Updates downloaded click the button “Check for problems“, see screenshot below, please.

.

Spybot Search & Destroy 2

.

The program will get launched (this will take some time, be patient…) and meanwhile YOU STILL can work with YOUR PC, but it will slow down…

.

Check the screenshot below to find out how the scanning process looks and YOU will see ALSO that YOU can use some tutorials through the scan window, in the “Help” menu, read carefully 😉

.

Spybot Search&Destroy 3

.

Once the scan is finished, WE will see the results, check screenshot, please.

.

Spybot Search&Destroy-NO infection

.

If there were some infections, WE will see this (see screenshot below, please).

.

Spybot

.

YOU need NOW to click the button “Fix selected problems” and the found problems will get removed.

BUT, there is STILL something more and very smart to do, using the “Immunize” function! This allows YOU to get a passive protection  as well, see text here, please ===> Spybot – Search & Destroy offers the Immunization – a feature to allow you to immunize your computer against certain pieces of spyware.
It also allows you to use native browser settings to block cookies, malware installations, bad websites and other threats via ActiveX. SDHelper is an Internet Explorer plugin that adds a second layer for blocking threats. While the Permanent Immunity blocks installers by their ActiveX ID, this one blocks anything that should come through by different aspects.

Anything else WE could do? Of course, I invite YOU to read my following blog posts:

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.Stay tuned for next blog(s) 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Cyber-Security And Privacy Knowledge As Skills In The 21st Century Are NOT Yet Enough Taught And Present, WHY!?

.

userfredericmoser01Did YOU realize already that WE are living in the 21st Century and that WE nearly ALL are using the so called NEW TECHNOLOGIES, the internet, the smartphone(s), laptops, computerstablets, household goods who are connected to the internet, and this on a daily base!? Did YOU ever started THINKING about such consequences concerning YOUR Privacy and vulnerability to Cyber-Security!? As far as I know, from practice while talking to people, most people are NOT as nobody has given them advice, NOR were they taught about it in schools, and there is the problem!

In the digital age, as WE are living NOW in it, WE MUST learn on a daily base to adapt to its very quick change! Education can’t follow with that as it is and was almost years behind… It needs to have a ===> RETHINK <=== to catch up!

SO… By knowing this and accepting it ALSO (the most difficult, BUT…) WE would be good advised for learning on a daily base to get the MOST out of necessary knowledge and skills to give OUR kids the BEST Education possible, an ===> Up-To-Date <=== knowledge, a knowledge who isn’t ONLY a cherry-picked knowledge, BUT a knowledge who includes ALSO Privacy and Cyber-Security as also skills!

The future is also that any device, even in the household, will be connected to the internet. It is called “The Internet Of Things” and as with any NEW technical stuff, it brings risks and vulnerabilities

MOST of people don’t realize the importance of privacy, especially for Cyber-Security and Identity Theft, check the video below who explains very good, please.

.

.

After watching the video YOU certainly are surprised and hopefully also willing to learn a bit more, it is actually NOT that difficult as most people think.


Who’s To Blame For Cyber-Security problems!?

Surveys from professional companies are NOW ALSO showing that Cyber-Security is OUR ALL responsibility, check below, please…

.

CyberSecurity-Responsibility

Check the full article here, please:

To start with learning, I would suggest YOU to read my blog about it first:

.


The Internet Of Things

Check out my curation about it and read the articles to find out what “The Internet Of Things” is, please…

.

Internet Of Things

Click image OR follow this link ===> http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Internet+Of+Things

.


The Dangers And Vulnerabilities Of  The Internet Of Things

.

Same procedure again, read my curation about it to find out, it is THE easiest way to get aware of the existing dangers and to get convinced about that LEARNing about Cyber-Security is a MUST…

.

Internet Of Things Vulnerabilities and Dangers

Click image OR follow this link ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

.


Wearables

[Start text from Kaspersky] The word “wearable” was once merely an adjective describing an article of clothing that was easy to wear. Now “wearable” refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week. New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.” [End text from Kaspersky]

Learn more:

.


Additional And Informative Stuff

programmerman-animatedBelow YOU will find some Tweets which I posted, related to this Topic of Cyber-Security and who will give YOU also an overview on How-To YOU could create Tweets (Posts) on Social-Media Twitter. YOU may use them, BUT please give credit to me as I was its creator, thanks 😉

.

#THINK global ===> #act global <=== #CyberSecurity is a MUST as WHEN WE are ONLINE WE are already #surfing #2gether on THE #DataHIGHWAY 😉

.

#Naivety in the Digital Age? http://wp.me/p20Rwv-u4 

.

Do YOU realize WHAT’s happening in the #VirtualWorld!? #EdChat

.

Like in #RealWorld YOU need #1stAidKit & #Safety WHEN using tools, SO ALSO in #VirtualWorld! #EdTechChat #InternetSafety #CyberSecurity 1/2

.

2/2 Using tools in #VirtualWorld WE need ALSO #1stAidKit which is #Protection #Antivirus as well as #InternetSafety #knowledge! #EdTechChat

.

By analogy, anyone who selects only the data that appeals to them and supports their personal view or theory is called a cherry picker. SO… WHEN using #BYOD #EdTech tools #iWHATEVER #Apps ===> #LEARNing & #TEACHing about #CyberSecurity & #Privacy is a MUST! <===

.

NEW #Technology gives YOU the possibility 2 SHOW UP as… BUT its a dreaming world! DON’T loose the #REALITY 😉 Do YOU got #Maturity!??? InternetSafety existing but NOT for adults, seniors… MUST get updated and created .

.

.

That’s WHAT #Teachers #EDUcators are today, DON’T see #REALITY ===> The aim of art is to represent not the outward appearance of things, but their inward significance. -Aristotle <=== #EDUcators .

.

WHEN #Researchers #EDUcators #TEACHers are relating #CyberSecurity to #software ===> #BackToSchool with THEM!

.

Please #Update YOUR #knowledge WE need 2 #RETHINK how WE are using #ICT #Technology #EdTech #iWHATEVER #Apps as WE do it unconsciously MOSTLY without #Responsibility#EDU

.

WE MUST #RETHINK #HowTo use #ICT #Technology #EdTech #iWHATEVER #Apps as WE use unconsciously MOSTLY without #Responsibility#CyberSecurity

.

WE have to prepare OUR children a safe internet… #EDUcation SHOULD lead learners 4 the #FUTURE, BUT actionnaly is a #Century behind, especially its #LEADERS ===> #LeaderShip #CyberSecurity

.

Remember these words ===> #Responsibility & #NotYET <== as a guide 2 GO a step FURTHER as #preparation 4 THE #FUTURE of OUR #Kids 😉

.

Keywords necessary for me to create this blog:

RETHINK, habits, bidirectional, 2 way, technology in 21st Century, connected, household goods, internet of things, BYOD, EDU, teachers and educators role, teachers create other professions, NO HALF-BAKED KNOWLEDGE, NO GADGETS MENTALITY, NOT ONLY a software problem,”Critical-Thinking, Proactive-Thinking, community sharing, Twitter Chat, Life-Long-Learning, MORAL, ETHICS, PRIVACY, Maturity, naivety, Zeitgeist, Smart Homes, wearables, Augmented Reality, ..

.

Will get updated often, as I have to publish it one day, otherwise I would NEVER finish it!

 

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

You are very welcome to give me new ideas, would be appreciated! Stay tuned for next blog(s) 😉

.

 
4 Comments

Posted by on January 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Books, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Evernote, Facebook, Free courses, FREE-courses, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Identity Theft, Internet Of Things, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tracing, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

PracTICE: BETTER Ways To Say “I DON’T know” In The Classroom

PracTICE: BETTER Ways To Say “I DON’T know” In The Classroom

.

Evolution of Education: Wordle Logo


THE Message “I DON’T Know, SHOULDN’T Exist”!

Do you allow students to answer a question with the response “I don’t know” in the classroom and do you find yourself ALSO sometimes in that situation? Consider no longer allowing that phrase and instead offering up this answer:

===> There are NO problems, ONLY solutions! Let’s find and create the solution together! <===

First of all, check the quote below, please, and THEN start THINKING about on How-To this could be realized, anyway WE will learn NOW how WE could create an engaging and creative way for STUDENTS and for OURSELVES as Teachers and Educators

. Image-quotes-creation.


THERE Are NO Problems, ONLY Solutions

.

sharing-iconEasy to say isn’t it!? BUT when WE have an up-to-date Professional-Development on new pedagogy and when WE know ALSO the appropriate tools, then WE are able to respond to it on a professional way 😉

As “Nobody Is Perfect” and as WE can’t have an answer for anything, Teachers, Educators, Students, so here is WHAT I did in the last 10 years when giving courses:

On the very early beginning when I gave courses I ONLY wrote down the questions on a board which everyone in the room could see and it wasn’t wiped out till the answer was given, where I couldn’t give a direct reply to the learners and told THEM that I would make some research about it to ask the question(s) in the next course, what I did also then. It was a reminder for ME and ALSO for THEM! Later, as I updated my Professional-Development, I learned about “Curation” and I curated everything concerning the new pedagogy, tools, Critical-Thinking and especially Proactive-Thinking and I learned it on a daily base

Creating websites ALSO, I learned and used FAQ lists ===> “Frequently Asked Questions” <===

.


How-TO Engage Everybody, Teachers And Learners?

As already mentioned ===> “Nobody Is Perfect. <===, so WE, Teachers, Educators and Students, have every time (OH YES that happens…) a question WHERE we can’t answer it directly! SO… As WE know that this happens on both sides TEACHERS and STUDENTS, WHY not trying to resolve it TOGETHER! Let’s create a win-win situation WHERE both sides benefit from it, sounds great isn’t it 😉 Is THAT possible and HOW!?

First of all, please, check the video below:

.

.

YES, it is possible, follow my instructions below please…

Let the students, learners, OWN THEIR learning and WHEN there is a question who couldn’t get answered directly give THEM as home-work to make a research on the internet to find out about that question, to find the answer(s). You as teacher, educator do the same and later on you compare your work together

Discuss about the value and quality of the acquired research results and use curation and/or a FAQ’s list to have the answers at any moment accessible over the internet. YOU will build together a database which will grow and be available ALSO for any internet user; YOU will participate in global community intelligence! Use YOUR pedagogical background to give positive feedback on the students work: diligence, Critical-Thinking, creativity…

Show the students, learners THEN the different possibilities and tools to archive the questions and answers and let THEM decide which one THEY would like to use and if THEY would like to do it ALONE and/OR in a TEAM!

===> THEY will feel proud about it as THEY build it UP and for 100% sure THEY will show it to OTHERS and THEY will learn through it (and OTHERS ALSO…)! <===

Later on, don’t forget about SHARING it with the global community on Social-Media (Twitter, Facebook, Pinterest…).

Here, below, a screenshot about a Glossary which my learners (range from 13-79 years old…) created themselves under my coaching on my website about Cyber-Security, 11 years ago already! THAT was a great success for the learners and for me, THEY still can access the database today 😉

.

Internet Monitor Glossary

..

The chosen languages from the learners where German and French…

.


Curation, WHAT Is It And WHY Using It!?

sharing-iconFirst I was wondering about this new trend and was not sure what to do with it, but after some research on the internet about it I found out that curation to me is the best way to collect articles which I select through quality criteria, which I can archive under different topics and which I find easily back through the “Tags”, as the “Tags” play the role of a table of content. For a Life-Long-Learner like me curation is like a treasure of knowledge and information that is getting shared through the online community. Through curation one has the possibility to FREE online learning and through sharing it to create a community with the same interests. Curation could also save people of same interests a lot of time and provides them with valuable content which could get used to link back to them in written articles, blogs, web sites and social media sites. Also one learns from each other in the curation community as one has the possibility to follow interesting curation.

As an ICT course instructor most of my curation is related to educational content and so I provide the curate content to an educational audience and to people who are willing to learn. Therefore I see curation also as help for a collective global learning and a contribution to a collective intelligence.

Check out my curation to find out, please:

.


FAQ, WHAT Is It And WHY Using It!? Make a list of possible questions that learners could ask, be prepared!

.

aigainformation1For new teachers this will be the hardest part, for “oldies” that would be easy anyway as they know already the questions which would get asked even before the course starts, experience… But anyway, I suggest to create a FAQ‘s list online, on the internal server and/or an a server where your blog is hosted. Why? You would have at any time and from anywhere where ever you are (and your learners) access to it to revise it, very important! I suggest also that you ask your students to help for creating such a FAQ’s listengage them! They will learn to learn…

.

Creating a FAQ’s list, but how? I am not used to that, what is your advice? There are different ways to create a FAQ’s list:

.

This list will be a great tool for yourself who saves you a lot of time when once created, show it to your learners and every time you would have access also to it: So once a question is asked, switch to that resource on Internet and/or on a local server…


Proactive-Thinking?

programmerman-animated.

Sounds strange, the word “Proactive-THINKing” to You, DON’T know How-To use it!? Here in one phrase explained:

.

It means:

=> THINKING WHAT could happen and being prepared to it already, PLUS avoiding that it would happen! OR even sometimes use it for THAT things happen! <=

It is a progressive way of THINKING, updates are on a daily base for BETTER knowledge! THINK ALSO ===> SUSTAINABILITY <===

Related links, OR from where does come my knowledge:

.


My keywords for helping  me to create this blog: database, FAQ, curation, updates, best search practices, thinking for other ways as curation as well, creative homework, Proactive-Thinking, Critical-Thinking, creativity, engagement, cross-knowledge, learning how to work together, collaboration, win-win, quality,  21st Century skills, EdTech tools, quality courses, preparation, Learning-To-Learn, including pictures and videos, valuable resources and links, let the students own their learning, student centered learning,  engage-me video,

Stay tuned for next blog and a NEW adventure of LEARNing 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , ,

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

.

Evolution of Education: Wordle Logo

.

This is the second blog about “Blogging” and in the first one ===> PracTICE: Using Blogs for Critical Thinking and Proactive Thinking <=== WE were talking about WHAT would be the BEST way to introduce the students (learners) to blogging. NOW, lets go for a practical example where the teachers (educators) tell the students (learners) to create a blog on a specific topic. It should be a topic WHERE there will be a lot of engagement from the students and from WHAT they would get a maximum out of ICT SKILLS, creativity, use of the technology (camera, smartphone, photo camera…), Social Media knowledge, communication, Social Learning, preparation knowledge, privacy knowledge (not publishing blog…), working in a team, collaboration

.

SO… WHAT could that be for a topic? Well, I think that something everybody could do is to write a blog about WHAT any single person makes probably different, ===> WHAT are WE eating at home? <===

sharing-iconOf course, if someone of YOUR students (learners) OR parents don’t WANT and allow to use that topic, leave it FREE to them to chose another topic! Make sure ALSO that the parents sign a paper that they agree with such an action as it goes into PRIVACY!

Other possibilities could be: pet, sport activities, reading (my books…), games (games which I play…), my hobbies (some have more than one hobby…), my friends hobbies… Talk to YOUR responsible psychological person in YOUR school, in case if YOU have kids with problems to find out WHAT could be the BEST way to get THEM also ===> engaged in that learning process <===

.

OR perhaps about an excursion which YOU made with the students, I recommend to visit my following blog to find out about the possibilities:

.

Have a look below, please, how this could look. I prepared myself a blog about what’s served on a table in Luxembourg (Europe), to give YOU an idea:

.

Depending in which country and/or state YOU are living, this could cause problems as well because of social status and privacy and certain parents wouldn’t allow such actions (NO one needs to know what’s happening in our family…)… Feel FREE to prepare a form which YOU handle out to the parents to hear THEIR opinion about it and tell THEM that THEIR kids (students, learners) are NOT forced to apply to it and could use another topic as already mentioned above… YOU will NEVER get a 100% agreement, BUT YOU could make the project a worth way to create together a project THAT shows the different ways HOW people THINK and HOW to show THAT it is STILL possible to create a COMMON project WHERE people are working together!

YOU will face the problems of REALITY from the REAL-WORLD by using the possibilities of the VIRTUAL-WORLD and YOU will be able to discuss these problems as well with YOUR students (learners) ===> Critical-Thinking and Proactive-Thinking… <=== Do YOU have this courage!???

Explain THEM also WHY it would be a good idea to agree to that project because of:

  • Students would work together to exchange about life, about the REAL-WORLD…
  • Students will learn from each other about different ways of life…
  • Students will learn how to use their smartphones and how to blog, learning about Social Media, blogging, getting 21st Century skills, how to combine smartphones, tablets, using THEIR creativity, working in a team, how to edit and correct photos for BETTER quality
  • Students will learn how to stay private while using blogs, securing their privacy so, because the teacher (educator) WILL FIRST HAVE A LOOK ON IT AND GIVE ADVICE before publishing the final version…
  • Students will learn to accept each other whatever their social status is…
  • Students prepare first THEIR own blog and than later a selection of the photos from each student will get used on THE COMMON COMMUNITY BLOG, where the students write also THEIR experience to document it…

.


The needed Tools And Services-The Preparation

.

ruotadentata2architet01First of all, WE need a FREE blogging service. I recommend WordPress as it is very easy to use and as it allows the students to chose from a variety of templates, so each student could use its own template to show its creativity. Then WE need ALSO an easy to use and a multi-platform (any OS compatible) PHOTO-EDITOR, where I recommend PHOTOSCAPE for Windows users ONLY, and GIMP (Windows, Linux, Mac) see below the links:

.


Keep It Private Till Everything Is Checked In Depth

.

Private publishing in WordPress.

.

As already mentioned above, students blogs should get kept private, WordPress offers this (check left hand screenshot) till the teacher(s) checked them in depth to make sure that their isn’t any privacy problem such as:

                    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
                    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
                    • WHAT is Geotagging?

.

.

.

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data!

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.


Useful Tips For Creating Blogs

.

book-question-markTo make sure for NOT loosing the topic of the created blog(s), I suggest to add at the bottom some reminder, the keywords which explain about WHAT the blog should be and ALSO the guideline for the students (learners), as shown below.

.

===> create blogs private, teacher checks blog & discusses with learners in a group, photos will get later ALL published in one blog as a TEAM blog, blog will get used with other students on a global view, like Skype, global exchange of habits to know each one better, social global approach… <===

.

This blog was created to make YOU THINK, to know about possible problems, to make YOU Critical-THINKing persons and Proactive-THINKing persons, use it as such, please 😉

.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,