10-Rep Learning ~ Teague's Tech Treks

Learning Technology & Tech Observations by Dr. Helen Teague

By

Curriculum Insights from the AIRS Report

The AIRS 2024 report supported by the Rand Corporation highlighted curriculum trends in ELA, math, and science, emphasizing educator needs and professional development. Generated content and infographic design edited by Dr. Helen Teague from MSCopilot partial summary and Infogram, web-based data visualization and infographics platform.

References to the Rand Report:

Doan, S., Eagan, J., Grant, D., & Kaufman, J. H. (2024). American Instructional Resources Surveys: 2024 Technical Documentation and Survey Results. American Educator Panels. Research Report. RR-A134-24. RAND Corporation. https://doi.org/10.7249/RRA134-24

By

Weekend Ed. Quote ~ May 23

“Learners can deepen their understanding of the evaluation criteria and improve their critical thinking and evaluation skills by analysing and evaluating their peers’ work. As the evaluated, learners can identify shortcomings through the feedback provided by their peers and adjust their learning strategies, thus developing their metacognitive skills” (Li & Wang, 2025; Tan and Chen, 2022)

Feedback Literacy Cycle

Image by Cameron Conaway, 2023. https://cameronconaway.com/feedback-literacy-learning-culture/

 

                                                                                          References

Conaway, C. (2023). To Improve Your Learning Culture, Promote Employee Feedback Literacy.  https://cameronconaway.com/feedback-literacy-learning-culture/

Li, L., & Wang, C. (2025). A dual-cycle peer evaluation model to enhance student feedback literacy: a three-round empirical educational study. Assessment & Evaluation in Higher Education, 1–22. https://doi.org/10.1080/02602938.2025.2487488

Tan, J. S. H., and W. Chen. 2022. “Peer Feedback to Support Collaborative Knowledge Improvement: What Kind of Feedback Feed-Forward?” Computers & Education 187: 104467. doi:10.1016/j.compedu.2022.104467.

By

The Will – a Peer Review Strategy for Virtual Gallery Walks

The “Will” Peer Review Strategy for Virtual Gallery Walks and other Online Peer Review

A Gallery Walk is a small group to whole group culminating activity in which student work is displayed. In traditional gallery walks, participants view each other’s work and comment with extemporaneous comments or a critical thinking schema (Jonson, 2005; Delgado, 2006; Frank & Krueger, 2025; Omiles & Ramirez, 2025).

In a digital update, a virtual gallery walk is an interactive learning experience with three steps.

Step 1 – Student designers create a digital artifact such as video, audio performance, original art work, slide deck, Google Slides presentations, Infographics, or Concept maps.

Step 2 – Students display their digital artifact, usually through posting in a threaded discussion forum or displayed in a virtual gallery format, similar to a physical art gallery walk. 

Step 3 – All students in a group or class click-walk through the uploaded digital learning artifacts in preparation for Step 4.

Step 4 Rationale – In order to provide deeper meaning and reinforce collaborative, socio-cultural learning, a review strategy is utilized. Previous posts in the 10-Rep Learning blog have featured the P*N*I Peer Review Strategy in Digital and Face-to-Face Gallery Walks. Teague’s 10-Rep Learning P*N*I strategy is an adaptation of Edward de Bono’s PMI Lateral Thinking strategy.
Another strategy to try is the “Will” Peer Review Strategy. The “Will” acronym stands for “What I Learned + Liked.” Students from grades 5 through 12 view the digitally uploaded artifacts (or links to the artifacts) and provide a reply post or digital caption following the letters in the word “Will” “What I Learned + Liked” or “What I Liked + Learned.”

     The “Will” Peer Review Strategy also is engaging for Adult Learners. Teachers and Instructors can vary the complexity of the “Will” statement with additional criteria. For teacher candidates in undergraduate or graduate online courses, the second sentence about what learning occurred may include what the viewer learned that would be effective for classroom use. For Adult Learners, responses reflect in-text and ending citations from the required studies and/or their own research. 

Step 4 Task Instructions: Please view your peers projects [i.e learning artifacts]. Next, post a 2-sentence Reply post summarizing your positive impression of the project [i.e. Learning artifact]. Compose a second sentence that describes what you learned. Begin your sentence with the name of the video creator. Optional: Conclude your WILL response with a question for the video creator to consider in reply to you.

Format example: Student “Will Reply”: What I Liked and Learned about Javier’s Concept Map on Cybersecurity: I Liked that Javier use two languages in the thought bubbles. What I Learned was that passwords need to be changed every 90 days.
Undergraduate/Graduate Student “Will” Reply: Javier, What I Learned from your Concept Map on Cybersecurity is that it will be effective on my classroom routines to prompt student’s to change their passwords every 90 days (Santana, 2025) and I will add this activity to my Google Calendar. What I liked about your Concept Map on Cybersecurity was its uncluttered design and text-to-background contrast that made it easier for me to read.
References
Santana, M. D. (2025). Eliminating the security weakness of Linux and UNIX Operating Systems. In Computer and information security handbook(p. 217-233). Morgan Kaufmann.


Core Message: Online and Digital Gallery Walk collaborative reflection strategies can increase collaborative support and dialogue through the “Will” reply strategy.

                                                               References

Delgado, R. A. (2006). Gallery Walk activity protocol. Education Consortium, LLC. https://campussuite-storage.s3.amazonaws.com/prod/1559107/a32ad7b8-90dc-11ec-98ec-0ad3f63f6779/2448636/b1651e1e-09b4-11ed-b18c-02679c9b5d8d/file/Gallery%20Walk%20Activity.pdf

Frank, R., & Krueger, S. (2025). Gallery walk as research method in information science. Information Research an international electronic journal30(iConf), 171-179. https://doi.org/10.47989/ir30iConf47554

Jonson, K. F. (2005). 60 Strategies for improving reading comprehension in Grades K-8. Corwin Press. Google Books Link.

Omiles, M. E., & Ramirez, E. J. D. (2025). Peer Learning Framework in The New Normal. Journal of Practical Studies in Education, 6(1), 14-25.
Teague, H (        The PNI

By

Excited to be part of the Compassionate Action Conference May 14 and 15

Excited to be part of the Compassionate Action Conference on May 14 & 15! Join me for the session titled “Calibrating a Compass of Compassion in Online Spaces.” In the digital realm, we often encounter messages that trigger a negative internal and external dialogue. This brief session aims to explore ways to foster compassion and harmonious online interactions.
Special thanks to Lucy Gray. hashtagCAC2025

CAC Presenters Graphic

GoalsAndObjectives

  1. Catalyze Bridging Strategies situated within unique online learning environments.
  2. Reinforce compassionate online listening practices
  3. Review Practical familiar diffusion strategies, refine with a twist for online spaces.

By

AI Generated Art Gallery

 

Created with AI-generated art and the ClassTools Gallery app.

By

Venn Diagram Creator with Tried-and-True Class Tools

By

Presenting at the Compassionate Action Conference

CAC Presenters Graphic
Session Title: Calibrating a Compass of Compassion in Online Spaces

CompassionateCompass Teague Session Information

Quick Session Overview: How can we show compassion and feel seen and heard in online spaces?  Simple, quick tech strategies can help. Let’s learn together!

Detailed Description: An unintended consequence of online interaction is that many people receive messaging through a negative internal voice. This short session promotes research-based ideas to align compassion, empathy, and peaceful interaction.

GoalsAndObjectives:

  1. Catalyze Bridging Strategies situated within unique online learning environments.
  2. Reinforce compassionate online listening practices
  3. Review Practical familiar diffusion strategies, refine with a twist for online spaces.

By

Attend the Compassionate Action Conference May 14 and May 15 2025

#CAC2025

By

Weekend Ed. Quotes ~ April 25

This week’s Ed Quote features STEAM connections spanning two centuries and features a quote from Dublin-born Edmund Burke. 

“Liberty does not exist in the absence of morality.” ~ Edmund Burke


Image Caption: Burke’s quote rendered as an vintage Meme generated by
ImgFlip AI https://imgflip.com/ 

This AI image features app smashing. AppSmashing involves combining content created in various different apps and “smashing” them together into one finished product. The AppSmashing for this quote included initial source post on X mobile, quote verification with Goodreads app, AI design with ImgFlip, and post through Edublogs mobile app. AppSmashing was first originated in 2013 by Greg Kulowiec from EdTechTeacher.

Edmund Burke was a Dublin-born, Anglo-Irish statesman, journalist, philosopher, and social theorist

 

 


More Weekend Ed. Quotes

#GCUTEC544 #GCUTEC595 #GCUTEC516 #GCUTEC521
#CUNE604, #CUNE605

By

Claude AI Creates a Virtual Bulletin Board

This is a summary conversation with Claude AI to create a Virtual Bulletin Board on the topic of Cybersecurity.

 

CYBERSECURITY BULLETIN BOARD
Common Attack Vectors
  • Phishing & Social Engineering
  • Malware & Ransomware
  • Password Attacks
  • Man-in-the-Middle Attacks
  • Denial of Service (DoS/DDoS)
  • SQL Injection & XSS
Password Best Practices
  • Use unique passwords for each account
  • Minimum 12 characters with mixed types
  • Consider using a password manager
  • Enable two-factor authentication (2FA)
  • Change passwords every 90-180 days
Phishing Prevention
  • Check sender email addresses carefully
  • Hover over links before clicking
  • Be wary of urgent requests or threats
  • Don’t open unexpected attachments
  • Verify unusual requests through other channels
Security Tools
  • Password Managers
  • Antivirus/Anti-malware Software
  • Virtual Private Networks (VPNs)
  • Firewall Protection
  • Disk Encryption Tools
  • Security Vulnerability Scanners
Zero Trust Security Model

“Never trust, always verify” – A security model that requires strict identity verification for everyone trying to access resources, regardless of location or network connection.

Key principles:

  • Verify explicitly
  • Use least privilege access
  • Assume breach mentality
Data Backup Strategy (3-2-1)
  • 3 copies of your data
  • 2 different storage types
  • 1 copy stored off-site
  • Regularly test your backups
  • Encrypt sensitive backup data
Latest Cybersecurity Trends
  • AI-powered security analysis
  • Cloud security solutions
  • IoT vulnerabilities
  • Ransomware as a Service (RaaS)
  • Supply chain attacks
  • Extended Detection and Response (XDR)
Security Certifications
  • CompTIA Security+
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • Certified Information Security Manager (CISM)
  • Offensive Security Certified Professional (OSCP)
If You’re Compromised
  1. Disconnect from internet immediately
  2. Change passwords from a clean device
  3. Notify IT security team/support
  4. Monitor accounts for suspicious activity
  5. Run malware scans after reconnecting
  6. Enable fraud alerts on financial accounts

 

 

 

Skip to toolbar