Search this site
Other stuff

 

All banner artwork by Brady Johnson, professional graphic artist.

My latest books:

   

        Available now

       Available Now

Available now 

My book Machines are the easy part; people are the hard part is now available as a free download at Lulu.

 The Blue Skunk Page on Facebook

 

EdTech Update

 Teach.com

 

 

 


Entries from January 1, 2016 - January 31, 2016

Sunday
Jan312016

BFTP: In praise of late adopters

I've decided to come out of the closet.

No, no, not that closet. But I need to fully confess that I am  a confirmed "late adopter." No more subterfuge, no more denial, no more embarrassment.

I am out and proud of my foot-dragging tendencies when it comes to personal technologies.

Most of us are familiar with the Rogers "Technology Adoption Lifecyle" popularized by Geoffrey Moore in his book Crossing the Chasm. (Info and graphic below are from Wikipedia.)

The original model was based on a study of farmers who adopted new agricultural methods. Rogers described the groups as:

  • innovators - had larger farms, were more educated, more prosperous and more risk-oriented
  • early adopters - younger, more educated, tended to be community leaders
  • early majority - more conservative but open to new ideas, active in community and influence to neighbours
  • late majority - older, less educated, fairly conservative and less socially active
  • laggards - very conservative, had small farms and capital, oldest and least educated

Moore and others saw this curve with all technology adoptions.

Why am I suddenly identifying with the "older, less educated, fairly conservative and less socially active" group, Well,  I recognize that it does increasingly fit my description. As the t-shirt says, I'm "over the hill and picking up speed."

But really it's because last week I got completely disgusted at having five different goddam ends for five goddam different devices that need to be charged.

  • My cell phone
  • My 3G wireless router
  • My iPad
  • My Kindle
  • My laptop

I got more cords than a Wurlitzer organ. (Or maybe that should be chords.)

I am quite sure others in my late adopter peer group will not have to deal with this charger nonsense; that a common "tip" for all devices must be on the horizon. All good things come to those who wait.

This lack of consistency is just one thing that makes sane people drag their feet about any technology adoption. Why should a busy teacher need to remember what charging cord goes to what do-hickey and carry a bag-full of them around?

Educational leaders (innovators) spend a lot of time encouraging and persuading the early adopters and even the early majority, but few pay much attention to those of us who want to make darned sure the time, effort and expense of doing something new is worth it.

We late adopters add stability to institutions in a world that changes at an unsettling rate. We demand hard evidence that the new thing is also the better thing. We recognize that there is value in some aspects of the status quo. We are more than happy to let others be on the bleeding edge and have the kinks all worked out of the system by the time we get to the new technology.

Here's my advice for getting those of us in the back of the line on the tech bus...

  • Make sure it works flawlessly, every time.
  • Make sure it really saves me time or makes me more productive.
  • Make it as transparent as possible.
  • Don't make me use so many steps I've got to write them down or keep a manual by my side.
  • Have plenty of endorsements about your technology from building-level practitioners - not starry-eyed visionaries.
  • Don't make me get a different charger.

Join me for Late Adopter Pride Week. I'll let you know when it is. If ever.

Original post January 4, 2011

Friday
Jan292016

Why do you need to be likeable?

4. Communicate well and listen to others. A great tech director must be able to write, speak, listen, and present. They must also hear and embrace input from others. Wolpert-Gawron, Heather. Eight Skills to Look for in a Director of Technology, Edutopia, January 25, 2016

It’s always, always, always better to be a nice person than an ass. ass.jpg
You will make mistakes at home and on the job. So keep this in mind: People will forgive your mistakes if you are generally a nice person; they never forget them if you behave like an ass.
from Machines Are the Easy Part; People Are the Hard Part. Illustration by Brady Johnson

I am not the most popular person in my school district this week. It's the beginning of the second semester and we have gone live with a new student information system. (Hence no blog posts either.) Despite a good deal of planning and preparation, there are permissions adjustments to be made, schedules out of whack, data exchanges with other systems to configure, and lots and lots of questions to be answered. Plus everyone is now experiencing the joy of learning how to do some old familiar tasks in new unfamiliar ways. (See "Where's the light switch?")

And it is my department - and ultimately me - who is viewed as responsible for the transition and changes.

While I've gotten a couple snarky e-mails questioning my competence (I have a "sarcasm" filter on my email and rarely check it), these stressed and busy professionals throughout the district have been supportive, patient, and calm. My staff, even under pressure, have been great.

These times of transition are hard for me since I like to think I am likeable* and criticism, direct or implied, makes me wonder if I am delusional rather than likeable. This is not a trival question since likeability, I've concluded, benefits both the liker and the likee.

In 2005 I wrote a column for librarians called "A Secret Weapon - Niceness", (LMC May 2005) In it I suggested that "The power of being a nice person is rarely discussed in the literature, but it probably has a bigger impact on our effectiveness and job tenure than any technical or professional skill we might hone." and suggested 8 traits of a "nice" person that would not just make that person more popular, but actually more effective. I stand by the column now 11 years later.

A recent column tackled a similar topic. In How to Be Exceptionally Likeable: 11 Things the Most Charming People Always Do. And you can too (Inc.com December 22, 2015), Jeff Hayden reminds his readers of some great attributes to cultivate if they want to be "genuinely likeable" including admitting their failings and putting their stuff away. Read it!

My guess is that most Blue Skunk readers are in some way, shape, or form a change agent. Likeability makes changes less painful for both the perp and the victim. Cultivate your charm.

What do you find that makes those with who you work likeable?

* My favorite line of Robert Burns is "O wad some Power the giftie gie us,  To see oursels as ithers see us!" Can we ever accurately see ourselves as others see us when it comes to being likeable?

Sunday
Jan242016

BFTP: A dozen ways to teach ethical and safe technology use

From The Classroom Teacher's Technology Survival Guide

A dozen ways to teach and promote ethical and safe technology use

Responsible teachers recognize that schools must give students the understandings and skills they need to stay safe not just in school, but outside of school where most Internet use by young people occurs. Over-filtered school networks set up a false sense of security; the real world of the Internet is quite different from the Internet at school.

Teachers who address safe and ethical Internet use proactively:

1. Articulate personal values when using technology. Talk to students about ethical online conduct and set clear limits about what is allowed and what is not allowed. Teachers need to be knowledgeable about the school’s Acceptable Use Policy and work to help their students understand it.  A district’s current acceptable use policy should include language about posting private information about both oneself and others. This private information includes home addresses, telephone numbers, e-mail addresses, and labeled photographs. Any bullying policies you might have should cover electronic bullying as well as physical bullying.

2. Stress the consideration and application of principles rather than relying on a detailed set of rules. Although sometimes more difficult to enforce in a consistent manner, a set of a few guidelines* rather than lengthy set of specific rules is more beneficial to students in the long run. By applying guidelines rather than following rules, students engage in higher level thinking processes and learn behaviors that will continue into their next classroom, their homes, and their adult lives.

3. Model ethical behaviors. All of us learn more from what others do than what they say. Verbalization of how we personally make decisions is a very powerful teaching tool, but it’s useless to lecture about safe and appropriate use when we ourselves might not follow our own rules.

4. Build student trust. If an inappropriate site is accidentally accessed, use the incident to teach some strategies about using clues in search result findings to discriminate between relevant and non-relevant sites. (“Jose, when the search results say ‘hot chicks xxx,’ that probably won’t be a source for your report on chickens.”)

5. Encourage discussion of ethical issues. “Cases,” whether from news sources or from actual school events, can provide superb discussion starters and should be used when students are actually learning computer skills. Students need practice in creating meaningful analogies between the virtual world and the physical world. How is reading another person’s e-mail without their permission like and unlike reading their physical mail?

6. Accept the fact students will make mistakes. Coach John Wooden famously said, “If you're not making mistakes, then you're not doing anything.” Learning is about making errors and figuring out how not to repeat them. A middle school student who shares her password with a friend who then destroys files has made a recoverable mistake -- one that she might remember before sharing personal data as an adult.

7. Allow students personal use of the Internet. If Internet computers are not being used for curricular purposes, students can research topics of personal interest (that are not inherently dangerous or pornographic). The best reason for allowing that is that students are far less likely to risk loss of Internet privileges if that means losing access to sites they enjoy.

8. Reinforce ethical behaviors and react to the misuse of technology. Technology use behaviors are treated no differently than other behaviors -- good or bad -- and the consequences of such behaviors are equal. Try not to overreact to incidents of technological misuse. If a student were caught reading Playboy in paper form, it’s doubtful we’d suspend all his reading privileges.

9. Create environments that help students avoid temptations. Computer screens that are easily monitored and the requirement that users log in and out of network systems help remove the opportunities for technology misuse. Your presence is a far more effective means of assuring good behavior than filtering software.

10. Assess children’s understanding of ethical concepts. Do not give technology-use privileges until a student has demonstrated that he or she knows and can apply school policies. Test appropriate use prior to students gaining online access.

11. Educate our students and ourselves. Aware teachers are using online curricula from organizations like iLearn, BlogSafety, NetFamilyNews, and Responsible Netizen to inform themselves and their children. These ready-made curricula are simple to integrate when teaching Internet safety units.

12. Educate your parents about ethical technology use. Through school newsletters, talks at parent organization meetings, and through school orientation programs, you can inform and enlist the aid of parents in teaching and enforcing good technology practices.

Will doing those things guarantee that a student will never get in trouble or danger online? Of course not. But schools never have been able to guarantee students’ physical safety either. What schools must be able to demonstrate is that they have shown due diligence -- that they have taken serious steps to prevent harm from occurring. That means a formal plan -- one that includes the above actions and documentation of the plan -- is necessary. And installing Internet filters alone does not constitute due diligence.

Ethical instruction needs to be on going. A single lesson, a single unit, or a single curriculum strand will not suffice. Teachers should integrate ethical instruction into every activity that uses technology.

* Johnson’s 3 P’s of Technology Ethics:

  1. Privacy - I will protect my privacy and respect the privacy of others.
  2. Property - I will protect my property and respect the property of others.
  3. a(P)propriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, church, school, or government.

Image source: http://gadgetsin.com/angel-and-devil-ipad-cases.htm

Original post December 26, 2010