You are currently browsing the category archive for the ‘Social Media’ category.

nc bc cc 10%Our national election occurs on Tuesday November 8 and I urge you to vote however your heart and mind lead you, but I also want to tell you who will be our next President and one significant reason why I believe that candidate will succeed.

The important point I want to demonstrate is far beyond a single election because the matter at issue is the future of American democracy.

In 2008 the Obama campaign produced an unprecedented combination of data analysis, social media and campaign outreach to win the Presidency.

The data analysis aspect used new techniques in what is commonly known as data-mining or big data analytics.

Both Democrats and Republicans have long kept databases of voters; you and I and every other eligible voter in the US is in these data-sets.

What Obama’s campaign innovated was a 100 item index that pulls from public and for-sale data sources such that every voter is categorized by education level, home ownership and value, permits and licenses, magazine subscriptions, charitable contributions and much more.General_election_polls_2016_Clinton_v_Trump

The campaign also buys data from companies such as Facebook to track which ads you click on and who your friends are.

The Democrat campaign knows more about you than you know about yourself in the sense that you may forget some of the details while their database, called “Catalyst,” does not.

The campaign technicians render all this data into a 1-5 scale that assigns probabilities to 2 behaviors for every voter: whether they will vote and who they will vote for.

What the campaign does with those ratings is the key to their electoral strategy because those individual profiles based in huge correlations of personal data are used to produce campaign tactics aimed specifically at you and voters like you; this tactic is called micro-targeting.

One way that micro-targeting is used was revealed when the Obama campaign recruited 2 million volunteers through Facebook and then provided each of them with instructions for door-to-door visits with specific individuals based on their ratings in Catalyst.

Another use of micro-targeting is to assign campaign ads to individual social media users. The political ads that you see on social media may well have been crafted uniquely for you, at least if they are from the Democrat campaigns.

Moreover the reactions of micro-targeted individuals are gathered and fed back to the database creating a dynamic loop that is capable of measuring large group responses based on tracking behaviors of individuals within the group.

After the 2008 election victory Obama directed the data analysts on his campaign to develop ways to use that technology for conducting White House policy efforts and called the resulting system “Legacy.”51i-UovOAYL._SY346_

This ultra-sophisticated use of data analysis to conduct a political campaign is studied in a fascinating book, Hacking the Electorate: How Campaigns Perceive Voters by Yale political scientist Eitan D. Hersh.

In addition to describing how political data-analysis and micro-targeting work, Hersh postulates that the sources of public data that campaigns draw from are likely to skew the data-set to preference some voter characteristics over others; for instance consider the data sources in which individuals are classified by race.

Why does any of this matter to you?

It matters because human beings have a peculiar relationship with our own thoughts in two ways.

The first is that it is hard for us to distinguish between our subjective feeling of certainty and the objective degree to which a claim about the world is certain.

For example, in this column I am claiming to know who will win the 2016 election.

In fact I cannot know that for certain because all sorts of events could occur to prevent that from happening, so I am really asserting a probability of an outcome based upon assumptions about the conditions.

LW268-MC-Escher-Hand-with-Reflecting-Sphere-1935Still, in my gut I feel totally certain about it despite being a skeptic about most things, and cannot convince my subjective sense to entertain more doubt.

The second peculiarity of human thought is while you and I know what we think and believe, we typically do not know where those thoughts and beliefs came from.

Try it yourself; consider some of the ideas (thoughts and beliefs) that you feel strongly about. Where did you get those ideas? Were you born with them? Were they taught to you? Did you inherit them? Did you discover them or make them up yourself?

If you are like most of us, then even the thoughts that you feel most certain about do not provide you with signs of their origins.

I am confident that you have reasons in favor of those ideas, but are those reasons actually the causes from which you formed the belief in the first place or are they premises that you developed to justify a belief that you already held?

Attend closely and I think that you will find that it is not easy to be sure about the workings of your own mind.

Why does this matter? Because there are interest groups who work hard to put ideas into your mind and once an idea is in your mind it is likely that you will experience it as certain and true, largely because it presents itself as your own idea.

To put it as clearly as I may: if I can get an idea into your mind and also get you to view it as your own idea, then I have succeeded at manipulating your mind.6914441342_605f947885_z

The manipulation of beliefs – the deliberate changing of people’s minds – is an ancient practice that we find today in advertisers, propagandists, magicians, preachers and teachers.

This mental manipulation is what the data-driven campaign is designed to do.

To be fair, politicians have sought to understand the public mind and put ideas into the minds of the people since at least ancient Greece.

Data-driven campaigning is not new, although the technological sophistication produces an unprecedented level of control over messaging.

That brings me to my prediction that Clinton will be elected President by a wide margin with the Democrats taking the Senate and making gains in the House.

That may not seem like a bold prediction to you because it has become common wisdom on the eve of the election, but I am basing my view on the uses by the Clinton campaign of whatever the Catalyst data-base has become.

One point to draw from this observation is that a candidate’s campaign foreshadows what their administration will be like.

Clinton’s campaign, like the Obama campaigns, are highly organized, disciplined and data-driven.

I view organization and discipline as positive attributes of an executive administration and they stand in stark contrast to the Trump campaign which spent more money on “Make America Great Again” hats than on data analysis.

However you evaluate these facts the reality of contemporary political dynamics calls for rigorous critical thinking about the messages that you receive and believe, if you care about your individual freedom as a thinker.

The future of the American political system is all about data and the more that you know about those processes, the better equipped you will be as a citizen and voter.

 

Image Acknowledgements

nc bc cc 10%.jpg
http://apps.cytoscape.org/media/cytonca/screenshots/nc%20bc%20cc%2010%25.jpg

General_election_polls_2016_Clinton_v_Trump.svg
https://upload.wikimedia.org/wikipedia/commons/thumb/d/df/General_election_polls_2016_Clinton_v_Trump.svg/1280px-General_election_polls_2016_Clinton_v_Trump.svg.png

51i-UovOAYL._SY346_.jpg
https://www.amazon.com/dp/B00Y37Z5OW

LW268-MC-Escher-Hand-with-Reflecting-Sphere-1935.jpg
http://www.mcescher.com/gallery/italian-period/hand-with-reflecting-sphere/

6914441342_605f947885_z.jpg
https://www.flickr.com/photos/75279887@N05/6914441342

Images are found via CC Search for Creative Commons licensed content.

Advertisements

muscular arm showing strengthYour passwords safeguard your identity and your property, but it is challenging to manage multiple secure passwords, so many people opt for less safe options putting them at greater risk.

You can have both security and practicality if you understand what your password is and how to protect it from the thieves.

Passwords date back to antiquity such as “The Histories” by Polybius (200-118 BC) which describes the use of passwords, also called “watchwords,” by Roman sentries to challenge those who sought passage; i.e. a pass – word. The Romans used sophisticated systems to distribute the passwords among troops while keeping them secret from their enemies. How do you share a secret and keep it secret? In those days it was not smart to forget your password; you did not get a chance to reset it.

In our time you can reset a forgotten password, but you may not be able to recover from a stolen one.  It is not smart to share your passwords with anyone, no matter how much you trust them, because that practice is precisely what thieves who use social engineering rely on. Your loved one will probably not betray you, but if their account is cracked by a hacker and they have your password, then you are both forsaken.  Sharing passwords radically increases your threat exposure.

Robert Siciliano of McAffee, a major computer security company, reports that; “74% of Internet users use the same password across multiple websites, so if a hacker gets your password, they now have access to all your accounts.” Reusing passwords is an open gate for your enemies to exploit.

Identity thieves also use hacking tools such as “John the Ripper,” a brute force password cracking tool that generates many thousands of variations of text strings until one of them succeeds in logging into your account. Programmers try to defeat brute force attacks by locking the account after a number of incorrect password attempts. The crackers can bypass that safeguard in some instances, so it is really up to you to create passwords that are improbable to match by brute force.

Most people use passwords that free dictionary attack software can crack in picoseconds.

Choosing easy to remember passwords such as a pet’s name like “princess,” a birth date or a common word is an invitation to disaster. A 2012 study showed that the three most frequently used passwords are “password,” “123456,” and “12345678.” Those favorites were followed in popularity by – and I am not making this up – “abc123,” “qwerty,” “login,” “princess” and “starwars.”

It is enough to make a grown tech support man cry and I pray that informed university members such as yourself do not replicate such patterns.

A way to understand this situation is to test the passwords that you are using now.  Please do not go entering your password into a web form just because it says “test your password.” It might be a trap set by the cracker hackers.

One password testing site, sponsored by Dashlane which makes password management software – How Secure is my Password –  lets you check the strength of your passwords.

According to that testing site, it would take the John the Ripper program

grumpy cat says "drat. My password was cracked."

My password was cracked.

about .001 picoseconds to crack the password “princess.”

 

“grumpycat” would take 2 minutes.

My email password would take 158 thousand years for John the Ripper to crack. I can live with that.  You can do the same and still remember your passwords even better than before with a few strategic moves.

The primary qualities in strong passwords are length, diversity and uniqueness.

1. Make your passwords 10 characters or more.

2. Use a diversity of character types in making your passwords; a mixture of lower-case, upper-case, numbers, letters and symbols.

3. Make a unique password for every account.

Here is a schema for implementing these three qualities while crafting passwords that your over-taxed memory can handle with ease.

Start with something that you know well and is not immediately obvious about you.  A favorite movie may be such a choice; let’s go with “Star Wars: Episode III – Revenge of the Sith” (2005) in which Yoda opines; “Not if anything to say about it I have.”

His speech is 30 characters long but you can certainly remember it, if Star Wars is your thing.

Some password systems allow spaces, but we will make Yoda’s wisdom universal by using punctuation; “Not.if.anything.to.say.about.it.I have.”

Using periods or hyphens or underscores or asterisks I can make a nearly impenetrable, but memorable, passphrase.  Note that it already has two capital letters which are intuitively placed for you, but not for the cracker hacker.

The fact that master Yoda is grammatically challenged works to our advantage.

Mixing numbers into the passphrase makes it stronger still and is required by some systems, so’ “Not.if.anything.2.say.about.it.I.have.” This is a very strong passphrase which I’ll bet that you could remember even if you do not care about Star Wars, because you now know the principles by which it was constructed.

What, then about the uniqueness factor? If you have to make a passphrase for every login, how can you remember all of them?

That’s pretty simple because with a super-strong passphrase you can make two ultra-strong moves.

First, consider making unique base passphrases for different types of logins; e.g., one for school, one for finances, one for email, one for social and one for everything else. Your passphrase for each can be aspects of the movie theme, or whatever works for you.

For example, my finances passphrase may be; “M0ney.the.r00t.0f.all.evil.i$.” which is pretty Yoda-like and is super-strong because you can see how it implements all three of the strength qualities.

Second, you can customize the password for each separate login site by adding something from the site.  For example, your Oregon State Credit Union (OSCU) login may be “OSCUM0ney.the.r00t.0f.all.evil.i$.” and your US Bank (USB) login may be “USBM0ney.the.r00t.0f.all.evil.i$.”

All you need to do now is remember the base passphrase and look at the site title for your add-on clue.

Crafting secure passwords is an indicator of practical intelligence.

If you follow these principles consistently, you can make many unique and strong passwords which are always available to your powers of recall.

If the examples given here seem overly complex to you, then go back and break down the steps which taken individually are quite simple. You can make shorter base passphrases and still get super-strong passwords if you follow the principles outlines here.

According to the Dashlane password strength testing site, “OSCUM0ney.the.r00t.of.all.evil.i$.” would take 20 quindecillion years for a computer brute force attack to guess. That’s a 1 followed by 48 zeros.

1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000

I think getting somewhere we are.

yoda from star wars

Wisdom is strength.

 

Work out your own system based on these principles and leave yourself some hints that will jog your memory but be obscure to others, such as; “What would Yoda do?”

Whatever you do, please do not leave your passwords in a weak, exposed condition. You have enough stress and do not need the hassle of identity theft and data loss.

When you do create those super-strong passwords, resist the impulse to share them with your friends to show how cool they are.  Bask instead in the glow of secret satisfaction.

The next great move that you can make in identity and data security is to use a password manager, such as Dashlane and LastPass.

That, my dear Padawans, the topic for next week’s column will be.

 

Image Acknowledgements

strong-310874_960_720.png
https://pixabay.com/en/strong-arm-muscle-muscles-310874

Grumpy-Cat.jpg
https://commons.wikimedia.org/wiki/File:Grumpy-Cat.jpg

Yoda_Empire_Strikes_Back.png
https://en.wikipedia.org/wiki/Yoda#/media/File:Yoda_Empire_Strikes_Back.png

Students searching for jobsI am about to tell you how to increase your odds for getting the job for which your degree qualifies you.

I write this mainly for the seniors and graduates who are looking for a job.

Perhaps you know someone in that situation and will share this advice with them.

Juniors, sophomores and frosh may take even better advantage of this knowledge by using it to make advance preparation.

My advice comes in two parts: (1) do your research; (2) use your education, not just your degree.

I hear many students ask Will this degree get me a job?”

The answer to that question is “No” because your degree is a tool that you must use in combination with other tools to get that job.

“It is not what you can do with your degree, but what you can do with a mind capable of earning that degree.”

Many thousands of others all over the world have degrees just like yours.

That is why you hear human resource departments tell you that your application is one among many.

So the winning move in the employment game is to document your unique abilities that stand out from the many

There are clear ways to accomplish that standout quality and it is a fact that most job applicants do not do so.

The most basic method is to make your resume, cover letter and reference letters match the needs and values of the prospective employer.

How do you know what they need and value? Because you have done your research on that employer.

You should research your job hunt with double the rigor and intensity that you put into any project or paper in school.

Research means learning everything you can about the job, the company and the people who work there, much of which is online.Linkedin network

A critical way to research a job is through the people who work for that company and department.  They all have profiles on LinkedIn and Facebook which will tell you about the work they do, the skills they value and the projects they are working on.

Search for the company in social media to find its employees.

It will take creativity on your part to find the right information and piece it together, but this is not more intellectually challenging than many of the course assignments that you have succeed

You are accomplished at those skills at some level, or else you would not be getting an OSU degree.

In the end it is not what you can do with your degree, but what you can do with a mind capable of earning that degree.

So how do I, Dr. Tech, know all of this? Because I have hired scores of employees and read hundreds of resumes, from high-school volunteers to Vice-Provosts.

Most of the resumes I have seen resemble a grocery list, merely enumerating the jobs worked at.

Such a resume does not include either what you are good at or what the employer is looking for.

Many job seekers bemoan the experience paradox – i.e. you can’t get a job without experience and you can’t get experience without a job.

If you feel trapped in that paradox it is because you have a narrow conception of your own experience.  You have lots of experience; four or five or more years of it at OSU alone.  You just need to recognize the activity of your education as experiential and turn that activity into language that communicates your expertise.

Consider another bit of information gained through research: there are consultants who report every year on industries of all kinds by conducting surveys of companies to find out what skills they are looking for in the people that they hire.

Please read that sentence again. How much would knowing what skills are most valued by the employers that you are applying to be worth? A lot and you can have that information for free just by doing online research.

In this instance I will refer to The Bloomberg Job Skills Report 2016: What Recruiters Want and Forbes’ The Ten Skills Employers Most Want in 20-Something Employees.

For the 2016 report Bloomberg surveyed 1,251 recruiters in 11 industries to find out which skills they rate both highly desired and hard to find.

Forbes based it’s analysis on surveys asking hiring managers what skills they prioritize when recruiting from college graduates.

Here are the skills employers say they seek, in order of importance as rated by employers.

1. Ability to work in a team structure

2. Ability to make decisions and solve problems (tie)

3. Ability to communicate verbally with people inside and outside an organization

4. Ability to plan, organize and prioritize work

5. Ability to obtain and process information

6. Ability to analyze quantitative data

7. Technical knowledge related to the job

8. Proficiency with computer software programs

9. Ability to create and/or edit written reports

10. Ability to sell and influence others

The good news is that the learning objectives and requirements for the majority of OSU degrees cover most of the skills on the list, which means that

Bacclaureate Core Writing Skills

OSU Bacc Core Skills

you have practiced them and have the right to claim them on your resume and cover letter.

Those group projects that many students complain about required that you actualize team work, decision processes, planning, communication and influence.

Baccalaureate Core, DPD, WIC and other requirements involve obtaining and processing information in order to write and communicate persuasively.

These are real skills that you have specific and demonstrated evidence of your competence in.

Even better, those skills are explicitly stated in the learning objectives for the courses, so you can refer to objective sources in claiming success with those skills.

If you passed an OSU Bacc Core course, then you succeeded at the skills certified through that course.  Have you mined your course objectives for demonstrated skills?

Draw on that objective evidence and you have unique and demonstrable qualifications to bring your resume and cover letter into the top tier.

That you can communicate, solve problems, find information, and lead a team is exactly the experience that employers say that they want.

They also say that those skills are “hard to find.”

Do not make them hard to find in your resume and cover letter.

As the Forbes article notes; “The survey makes clear that employers want universal skills you can learn across academic disciplines and in any job where you are working with others. The trick is to communicate clearly that you have those skills.”

The trick for you is to take ownership of your acquired skills and take yourself seriously as a fully educated person, not merely an applicant with a degree.

You will accomplish that by researching what your prospective employer values and by researching what skills your OSU education gives you the right to claim as your own.

 

Image Acknowledgements

looking-for-a-job-68958_960_720.jpg
https://pixabay.com/en/looking-for-a-job-work-silhouettes-68958/

head-1250008_960_720.gif
https://pixabay.com/en/head-circle-linkedin-networks-1250008/

bacc_core_skills.jpg
http://oregonstate.edu/ctl/baccalaureate-core

77aa99b53b82d17d5f03ca8a3fcbfe35All learning is a form of research as we test our mental models of reality against the cold hard facts of the world.

When someone keeps making the same mistake we can say that they have not learned what that mistake is and how to avoid it.

Humans have evolved the ability to keep track of our successes and failures in order learn.

Keeping track of and analyzing what happens is the basis of research, which I claim is the foundation of learning.

It follows that treating your education as a research process will make you a more capable learner.

Technology can help you to become a more capable researcher and to better understand the relations of information and reason to knowledge.

Zotero is an OSU supported no-cost application that assists with collecting, organizing and citing research sources.zotero_logo_300x300

You should be using Zotero or a similar tool because when you write a paper or produce a project the sources upon which it is based are critical.

Your sources are established by citations which follow formats including APA, MLA, Turbian and IEEE.

If these are not familiar to you, then you are at a distinct disadvantage when developing a paper or project for a class as many instructors place significant grade value on well-formed citations in the correct format.

Check your syllabus and assignment description to ascertain the citation format then install Zotero and access the OSU Library resources to learn how to use it well.

Zotero has a stand-alone version to install on Windows or Mac and also as plugins for FireFox, Safari and Chrome and apps for iOS and Android

Build your Zotero “Library” by creating a “Collection” and adding sources as you search for sources.

A Collection may be for a project, a class, a topic or whatever you need to gather information for.

The sources can be books, articles, websites, videos and other forms of information that you have used in developing your work.

While developing your work, such as a paper or project use Zotero to retrieve sources and then to cite those sources for your bibliography.

A bibliography is the part of a work that lists the sources that form the research upon which the work is based.

The purpose of a bibliography is so that readers can retrieve the sources in order to check on the accuracy of the claims in the work.

Bibliographies consist of references which provide the information that anyone needs to find and retrieve the source referred to.

Citations are the expressions embedded in the text of a work that indicate the reference on which that portion of the work is based.

In my work as an Editor I have received submissions that included bibliographies that contained numerous references that were not cited in the text of the paper.

I sent those submissions back for revision because the relevant references are those that are used in creating the work.

It is an error to pad a bibliography with books and articles that you did not read or use in your writing.

If you did use a source, then cite and reference it properly.

If you did not use a source, then do not refer to it.

2447112317_b1f13112cbIf any of these aspects of research puzzle you, then you should visit the OSU Writing Center at 123 Waldo.

Writing Center assistants will help students, staff, faculty and community members with all aspects of writing from brainstorming to writer’s block to bibliographies and beyond.

Once you understand what citations and bibliographies are and know what formats are required for your papers, then you are in a strong position to use writing tools like Zotero effectively.

A powerful feature of Zotero is the capability to create Collection items contextually from your Web browser so to gather relevant reference information from whatever web source that you are viewing.

This contextual sensing feature is amazing when researching journal articles, news articles and books in the OSU Library; see the Valley Library tutorial “Using Zotero with 1Search.”

I emphasize again that finding likely titles and capturing reference information is not research unless you read the sources and use them in your work.Research-Illistration-4x4

Once you have a collection of sources Zotero helps you tag, sort, move, copy, annotate and edit your sources.

Organizing and connecting your sources, which are prior information about a topic, is a powerful way to construct knowledge out of your research.

Knowledge constructed from intentional collections of sources may involve finding patterns, drawing inferences, producing new research questions, identifying problems and much more.

A research-based paper and project is designed to communicate the knowledge that you have constructed, your findings, from the sources that you have collected and analyzed.

That is a basic description of how research and learning work.

Zotero supports sharing collections online which vastly increases its power as a research tool, for instance when working on a group project designate a role for “research managerin the group and have them curate the Zotero collections.

With your thesis, narrative, and references accomplished you then use Zotero to produce the bibliography which can export to Word and OpenOffice documents.

With a collection and bibliography created it is easy to re-format your references to different citation standards.

Valley Library has many resources including workshops and online tutorials for becoming proficient with Zotero at guides.library.oregonstate.edu/zotero

In addition to Zotero I have used Citation Machine, a web-based citation creator, to create bibliographies for publications – citationmachine.net.

Both tools provide a form in a selected citation style that prompts you for necessary information about a source such as author’s name, book title, publication date, page number and publisher.

Both tools allow switching citation styles for already created references.

Zotero is the more powerful of the two, but Citation Machine is handy.

Social bookmarking is a technology that is related to the research-oriented tools.

Diigo and Delicious are powerful social bookmarking applications, also called “social tagging,” with browser extensions that support tagging, annotating and highlighting web sources including pages, PDFs, blog posts, images and videos.

The social character of these tools is changing the way that information and knowledge works.

Think of the efficiency with which disinformation such as rumors spread.Wikipedia_-_taste_the_fruit_of_knowledge

Now imagine similarly efficient information but grounded in referenced sources.

Our information environment is changing fast and you will be better equipped for that change when you are able to use social bookmarking and referencing tools.

Most important is your understanding of how information constructs knowledge and how references provide evidence.

Of immediate value to you is how you can use these tools to do a stronger job of writing papers and projects.

Image Acknowledgements

77aa99b53b82d17d5f03ca8a3fcbfe35.jpeg
https://www.pinterest.com/pin/551409548100840461/

hBQdLi.png
https://pbs.twimg.com/profile_images/482247447293337601/hBQdLi_-.png

2447112317_b1f13112cb.jpeg
https://www.flickr.com/photos/12662957@N05/2447112317/

Wikipedia_-_taste_the_fruit_of_knowledge.jpeg
https://upload.wikimedia.org/wikipedia/commons/b/bc/Wikipedia_-_taste_the_fruit_of_knowledge.jpg

title_orange_logo

immersive_environments…augmented_reality…virtual worlds…robots…full_VR…games…social_media…community…genius

The Immersive Learning Research Network (ILRN) conference 2014 at Oregon’s State University (Corvallis, OR) in person, webcast, and Second Life – November 20, 21, 22, 2014.   Sponsored by The ILRNTechnology Across the Curriculum (TAC), Oregon State University, and the Applied Research in immersive Environments for Learning Special Interest Group (ARiEL SIG) of the American Educational Research Association (AERA).

Attendance (free)

Conference Schedule
http://elcommons.org/conferences/emergent-learning-conference-2014/?show=schedule

Live Web Cast
http://live.oregonstate.edu/elc

Second Life – Beaver Island
http://maps.secondlife.com/secondlife/Oregon%20State%20University/193/145/30

http://oregonstate.edu/tac/how-to-use/virtual-worlds/beaver-island

Everyone is encouraged to join ILRN for free before January 1, 2015 when membership application fees may apply. See http://immersivelrn.org/ for information on joining the Network.

The theme for the ILRN Corvallis, Oregon 2014 Meetup is “Immersed in the Future, Together: Scholarship, Experience, and Community”. The iLRN Oregon Meetup Committee will give preference to those proposals of Immersive Learning presentations that feature:

  • Attempts to substantively bridge multiple kinds of expertise to generate a sense of “immersion” (e.g. psychology, pedagogy, architecture, computer science, etc)
  • Sharing resources and visions for Immersive Learning researchers and practitioners to use in developing a common future
  • Sharing technical expertise on creation of Immersive Learning experiences that is not readily available for free elsewhere
  • Featuring design or evidence based reasoning for learning within the design of an immersive experience
  • Explicitly develops capacity within immersive learning experiences to form community OR focuses on the community that forms as a result of efforts to create immersive learning experiences
  • Providing Open Educational Resources or open source possibilities for developing Immersive Learning to everyone – to encourage community and sharing
  • Articulating conceptual frameworks or definitions for specific kinds of Immersive Learning expertise that may be of possible benefit or use by others

Please join us

Contact:

………………………………………………………………………………………….
Jon Louis Dorbolo, Ph.D.
Associate Director
Technology Across the Curriculum (TAC)
317 Waldo Hall
Oregon State University
Corvallis, OR 97331
Email: Jon.Dorbolo@oregonstate.edu
Gmail: jondorbolo@gmail.com
Web: http://oregonstate.edu/tac
Voice: 541.737.3811
Fax: 541.737.7967
SMS: 541.915.0260
Blog: http://jondorbolo.com
Google
Talk:
jondorbolo
Skype: jondorbolo
Facebook: http://www.facebook.com/jon.dorbolo
Twitter
: http://twitter.com/osu_tac
Linkedin
:
http://www.linkedin.com/in/dorbolo
Bookmarks
: http://www.diigo.com/list/dorbolo
Youtube
: http://www.youtube.com/jondorbolo
SL
Avatar:
Chiron Mirror
slurl: Beaver Island

clip_image001

OSU is where IT is AT (Academic Technology)

TAC’s got your back!

Read Ask Dr Tech in Monday’s Barometer

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 320 other followers

RSS thought currents

  • An error has occurred; the feed is probably down. Try again later.