135,406 research outputs found

    Getting From Here to There in Resistricting Reform

    Get PDF
    This symposium has been largely devoted to whether and how we ought to reform our districting process. Today I want to talk about a related but often neglected question: if we are serious about reform, how do we make it happen? I will thus set aside some of the important normative and practical questions associated with what kind of redistricting reform we should pursue and focus instead on how to get from here to there. As we think about getting redistricting reform passed, we ought to ask ourselves three questions. First, what should our goals be during the 2010 cycle? Second, moving from principle to practice, what specifically can we do to promote reform during this period? Third, if we succeed in getting some traction with reform post-2010, what kind of reform proposals should we push

    Maximizing Competency Education and Blended Learning: Insights from Experts

    Get PDF
    In May 2014, CompetencyWorks brought together twenty-three technical assistance providers to examine their catalytic role in implementing next generation learning models, share each other's knowledge and expertise about blended learning and competency education, and discuss next steps to move the field forward with a focus on equity and quality. Our strategy maintains that by building the knowledge and networks of technical assistance providers, these groups can play an even more catalytic role in advancing the field. The objective of the convening was to help educate and level set the understanding of competency education and its design elements, as well as to build knowledge about using blended learning modalities within competency-based environments. This paper attempts to draw together the wide-ranging conversations from the convening to provide background knowledge for educators to understand what it will take to transform from traditional to personalized, competency-based systems that take full advantage of blended learning

    Museums and New Media Art

    Get PDF
    Investigates the relationship between new media art and museums

    Analyse the risks of ad hoc programming in web development and develop a metrics of appropriate tools

    Get PDF
    Today the World Wide Web has become one of the most powerful tools for business promotion and social networking. As the use of websites and web applications to promote the businesses has increased drastically over the past few years, the complexity of managing them and protecting them from security threats has become a complicated task for the organizations. On the other hand, most of the web projects are at risk and less secure due to lack of quality programming. Although there are plenty of frameworks available for free in the market to improve the quality of programming, most of the programmers use ad hoc programming rather than using frameworks which could save their time and repeated work. The research identifies the different frameworks in PHP and .NET programming, and evaluates their benefits and drawbacks in the web application development. The research aims to help web development companies to minimize the risks involved in developing large web projects and develop a metrics of appropriate frameworks to be used for the specific projects. The study examined the way web applications were developed in different software companies and the advantages of using frameworks while developing them. The findings of the results show that it was not only the experience of developers that motivated them to use frameworks. The major conclusions and recommendations drawn from this research were that the main reasons behind web developers avoiding frameworks are that they are difficult to learn and implement. Also, the motivations factors for programmers towards using frameworks were self-efficiency, habit of learning new things and awareness about the benefits of frameworks. The research recommended companies to use appropriate frameworks to protect their projects against security threats like SQL injection and RSS injectio
    • …
    corecore