article thumbnail

Hoping to Spur 'Learning Engineering,' Carnegie Mellon Will Open-Source Its Digital-Learning Software

Edsurge

In an unusual move intended to shake up how college teaching is done around the world, Carnegie Mellon University today announced that it will give away dozens of the digital-learning software tools it has built over more than a decade—and make their underlying code available for anyone to see and modify.

Software 147
article thumbnail

What's on the Horizon (Still, Again, Always) for Ed-Tech

Hack Education

My project also makes some of the information available in a machine-readable format instead of solely in a PDF. (It Of course, the Horizon Report dates back to 2004, so this is only a partial look back at its own history. Adaptive Learning Technologies. Mobile Learning. Two to Three Years. The Internet of Things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Rough Beasts of Ed-Tech

Hack Education

It’s also a matter of a $40 million civil suit against Trump University, a business that Donald Trump and two associates founded in 2004. But it did offer courses in real estate, entrepreneurship, and wealth management via, yes, technology-enhanced learning – that is, via Web-based courses. How much of ed-tech is humbug?

article thumbnail

New book chapter in Multimedia Learning Theory!

Dangerously Irrelevant

Student information systems, online gradebooks, electronic formative assessment tools, and data warehouses are all examples of technologies that help educators input, manage, analyze, and present student learning data (Wayman, Stringfield, & Yakimowski, 2004).

article thumbnail

'The Brave Little Surveillance Bear' and Other Stories We Tell About Robots Raising Children

Hack Education

Mattel is already selling an Internet-connected Barbie – Hello Barbie – and an Internet-connected Barbie Dreamhouse, much to the consternation of privacy and information security advocates who caution that these devices are incredibly insecure, that the microphone and the stored audio files are readily accessible to hackers.