Dissecting, Applying & Securing Web 2.0 in the Classroom Rod Gode Director, Specialist Sales, US...

Preview:

Citation preview

Dissecting, Applying & Securing

Web 2.0 in the Classroom

Rod GodeDirector, Specialist Sales, US EducationMicrosoft Corporationrgode@microsoft.comhttp://blogs.technet.com/rgode

Session Agenda

• Understanding “Web 2.0”• Extrapolating Web 2.0 to Education• Demo: Exploring Microsoft Web 2.0 Solutions• Reality Check: IT, Security & Privacy

Grounding• Web 2.0• Blogging/MicroBlogging• Wiki• Folksonomy• Podcasting• Social Network• Mash Up• Mobility

A Nation (Still) at Risk?• More than 70% of US 4 year-olds have used a computer• Today’s Learners will have 10-14 jobs by age 38• China has as many honors students as the US has students• The volume of technical information is doubling every 2

years; by 2010, it will double every 3 days• We are currently preparing our students for jobs that don’t

exist, using technologies that haven’t been invented, in order to solve problems we don’t even know are problems yet

- “Did You Know 2.0 (Shift Happens)”, Karl Fisch & Scott McCleodhttp://www.youtube.com/watch?v=pMcfrLYDm2U

- A Nation at Risk, 1983 report of Reagan Administration National Commission on Excellence in Educationhttp://en.wikipedia.org/wiki/Nation_at_Risk

Understanding the Shift

Minds on Fire: Open Education, the Long Tail and Learning 2.0(EDUCAUSE Review – Jan/Feb 2008)

http://connect.educause.edu/Library/EDUCAUSE+Review/MindsonFireOpenEducationt/45823

The Long TailChris Anderson – Editor in Chief WIRED

http://www.thelongtail.com/

From Knowledgeable to Knowledge-able: Experiments in New Media Literacy

Michael Wesch, Professor, KSU at ELI Conference

http://connect.educause.edu/blog/gbayne/elipodcastfromknowledgeab/48091?time=1234930406

The Long Tail

Amazon.comAmazon.com

SoftwareSoftware

WikipediaWikipedia

Teaching & LearningTeaching & Learning

Mass Collaboration Levers

Web 2.0 Meets Learning 2.0

SearchSearch

WikiWiki

BlogBlog

PodcastPodcast

MappingMapping

Specialized Specialized ExperiencesExperiences

Social Social NetworkNetwork

HPCHPC

Video Video SharingSharing

DistanceDistanceLearningLearning

Communicate Communicate & Collaborate& Collaborate

VisualizationVisualization

MobileMobileDevicesDevices

IM & IM & PresencePresence

SaaSSaaSMash UpMash Up

(Web 3.0)(Web 3.0)

Web 2.0 – Microsoft Lens

A little more on search

Learning 2.0 on Web 2.0

Classroom Essentials – Supporting Web 2.0

1. Outcomes first, technology second1. Tools and platforms will change rapidly2. Foundational expertise allows application to any tool/platform

2. Challenge Yourself1. Cell phones as learning tools?2. Project-based and team learning

3. Emphasize communication and collaboration1. Technology will emphasize itself2. Use technology as reward

IT Essentials – Supporting Web 2.0

1. Identity Management Imperative• What’s your strategy?• Exploring Single Sign On• Moving protection from firewall to role

2. Abstracting and OutSourcing the Commodities1. Storage2. Mail3. Collaboration4. Privacy & Security?

3. Broaden capacity for sharing and community4. Evaluate Anytime, Anywhere Accessibility

Privacy & Security Paradigms

• New Age of “Web Cred”• w(e+i) = 1/a• Monetization Motivation• Entry & Trial Thresholds• Anonymity & Physical Isolation• Anywhere, Anytime Access

Son, what did you do today?

“I downloaded 50 new MP3s, penetrated 15 corporate servers and clicked on 5 highly questionable internet links”

“I stole 3 new CDs, snuck into 3 offices and looked at corporate data, and shared my detailed personal information with 5 complete strangers”

Need higher understanding of risks among parents, students and admins

Security & Privacy Common Sense Conclusions

• Apply Principles of “Least Privileged” and “Most Restrictive”• A Stranger online is the same as a Stranger in person, only

worse• It’s all about money: links, ads, pop-ups, phishing, spam• Keep your computer updated and let it do its job protecting you• Risk Assessment: Cloud vs. Hosted vs. On-Premise

Security & Privacy - Resources

Legal Considerations (FERPA, CIPA, COPA)•The Law and Policy of Web 2.0: Much Old, Some New, Lots Borrowed, So Don’t Be Bluehttp://www-cdn.educause.edu/sites/default/files/2009/01/eli09_cate.mp3

Guidance, Practices, Settings•http://www.staysafe.org•http://www.staysafeonline.org•http://www.microsoft.com/protect•http://safetynet.aap.org/ Curriculum•http://www.isafe.org•http://cybersmartcurriculum.org/cyberbullying/

What you saw…• Live Labs

http://www.livelabs.com/pivot • Worldwide Telescope

http://www.worldwidetelescope.org• BING

http://www.bing.comhttp://maps.bing.com

• Photosynthhttp://www.photosynth.net

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after

the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.