At Rutgers University, we have designed a pedagogically-sound, 6 step process that helps guide faculty through the hybrid course development experience, with minimal instructional designer intervention. In 90 minute training sessions, we help facult...
The growth of ubiquitous, free or low cost technology tools has transformed the hard copy portfolio into a digital document. Electronic portfolios have the potential to illustrate a great range of student capabilities. Despite this, the implementati...
Accessible from computers, laptops, and mobile devices such as the iPad, iPhone, Android, and Smartphones and available directly from within the course management system, the new embedded textbook allows online instructors to add rich learning mater...
"In this session, you will see a rare and enlightening demonstration of a database hack through the experience of both the hacker and innocent victim. See how easily it can be done as well as the unfortunate results.
This demonstration will also inc...
Mary Chayko and Denise Kreiger will present their hybrid course design process based on Quality Matters standards and incorporation of diverse social technologies into the course, as well as the QM course review process.
The winners are drawn and prizes are awarded.
Dr. Robbie Melton, Associate Vice Chancellor of eLearning and Emerging Mobilization Technology, Tennessee Board of Regents (TBR) talks about how emerging mobile technologies are transforming programs across higher education and the workforce. These...
Using game elements to create interactive, engaging instruction doesn't have to mean investing hours and hours into the development of a full-scale Halo-type game. Creating an interactive, game-like learning experience can be done simply and easily ...
Technology-enhanced teaching is now the classroom standard, and online learning has proven it's relevance and effectiveness. Yet between those two poles it is blended learning that may be best situated to transform learning as society continues adap...
In this session, participants will examine how to identify the unknown threat, how it infects infrastructures, how it is propagated, how it owns the networks and the solution to this threat. We will review the differences between known and unknown t...