I haven’t tried it, but Sensu’s new brush looks like a delicious option for painterly work on the iPad. It converts from a paintbrush to a stylus, and the bristles look very well-shaped. Anyone tried one?
Category Archives: everything
The wonderful folks at UFM have begun putting videos of the TEDx talks from August 18 up on YouTube, and mine is one of them! They did a fantastic job with the editing. Take a look:
Other talks from this year are being added as they are ready. You can see Rocío Pinto’s La vida no es un algoritmo now (it’s in Spanish, but you can turn on subtitles).
… and it was an awesome experience!
The event was TEDxUFM at the Universidad Francisco Marroquin in Guatemala City. The theme was to explore education and the new culture of learning, especially as it involves play, questioning, and imagination. I am over-the-moon thrilled that I had the opportunity to participate in a TEDx event, especially this one, as the topic is close to my heart. The organizers and staff who put on TEDxUFM 2012 did a fantastic job — just look at this year’s lineup of speakers!
It was an honor to be speaking alongside USC’s Douglas Thomas (co-author of A New Culture of Learning) and Khan Academy developer David Hu, as well as the spectacular group of speakers and performers from Guatemala.
My visual notes of Doug Thomas’ TED talk, TEDxUFM, August 19 2012
More of my visual notes are coming soon to Flickr… I have to finish them! Following my own advice, I got the key points down and left spaces for embellishments to be added later. TED talks go by fast, and almost all the points are key!
My talk, Drawing in Class, explored visual note taking — particularly the role of personal visual note taking for students. The video will be up in four to six weeks, but here is the full slide set (with notes), posted on Slideshare:
Related Materials and Links:
- UFM Website (be sure to take a look at the New Media website, which houses thousands of recorded lectures and talks)
- The TEDxUFM website
- A New Culture of Learning by Doug Thomas and John Seely Brown – I highly recommend it
- Drawing in Class, my presentation, on Slideshare
- A curated collection of tweets during my talk (thanks to TEDxUFM staff)
- TEDxUFM 2012 on Flickr
- TEDxUFM 2012 At a Glance (video)
- Event Preparation & Setup (video)
- TEDxUFM blog
While I was preparing for the talk, I found Nancy Duarte’s 10 Ways to Prepare for a TED-Format Talk to be a wonderful resource. I started with the sticky note tip and wrote each example or point on a note. Then I moved them around until I was happy with them, trimming and re-ordering until I liked the story.
Preparing for my talk using Nancy Duarte’s advice
Her suggestions helped me to focus on the “why,” and the advice about rehearsing with the clock first running up and then running down was invaluable.
I found this page after I had already given the talk, but if a TED-format talk is in your future, you might want to take a look: How to “Do” a TED Talk from Teaching with TED.
The whole experience was incredibly cool, but I think my favorite part was being called a conferencista. How fantastic is that?
UPDATED 24 August — added more related links.
I received a question today that many people have asked me: How do I make my lettering so neat and precise when I’m using drawing apps on the iPad? I’ve been asked if it’s a font, or if I use a special stylus or some other trick. Here’s my (perhaps disappointingly simple) answer.
A recent piece. I’m still working on my lettering, by the way. Always.
I don’t use a stylus; I just use my finger. I zoom way way in so that I can only see a few words at a time, and then I scoot along as I write. The precise lettering is mostly due to practice — if you look at some of the earliest work I did, you’ll see that I’ve come a long way 🙂
The very first iPad graphic recording I ever did – May 8, 2010. For reference, the iPad I was using (wifi + 3G) became available on April 30, 2010 — about a week earlier. I leapt right in.
One trick I can share is to line up the baseline of whatever you’re writing so that it’s a little bit above the app border on the iPad. For instance, if you zoom way in, you can move the page around to put the words about half an inch above the bottom edge of the app, which of course is straight. Then use that as a guide while you write. In Brushes, you’d do this by using the two-finger-spread to zoom in, then use two fingers to move the page around until your text was just above the toolbar (or the bottom of the app if you’ve hidden the toolbar). Write a bit, use two fingers to move the page sideways, and continue.
Zooming in and lining up the baseline of text in Brushes.
That’s the main reason I don’t use a stylus, by the way — I’m always zooming and moving the screen, and if I had to hold a stylus while I did it, it would take way too long.
This article by Nancy Settle-Murphy and Rick Lent includes excellent tips for structuring virtual meetings to be successful.
Structuring Successful Virtual Meetings:
A Counterintuitive Approach
Wouldn’t it be great if all we had to do to run a great virtual meeting is to use the exact same structures and techniques that we use for face-to-face (FTF) meetings? Great for the meeting leader, maybe, but not so great for the meeting participants who have to muster every ounce of energy to just pretend they’re engaged.
Sadly, many people run their virtual meetings pretty much the same way they run their face-to-face meetings, which truth be told, aren’t all that engaging to begin with. After all, it takes a lot less time to simply ignore the unique challenges and opportunities of virtual meetings–such the inability to read nonverbal cues, the tendency to multitask, and the imperative to keep virtual meetings exceptionally focused and brief–than it does to accommodate them.
Some friends have been asking about two-step verification for Gmail accounts. Should we do it? How does one go about it? What behavioral changes will we have to put up with afterward?
The answer to the first question is yes, Ruthie, yes. Read on for answers to the other two. First, though, if you’re imagining that this is a funky new dance step, you need a little background information. Go read Matt Honan’s story. This is what we’re preventing with this precautionary measure. I’m not a fear-monger, but it could happen to you, too. Go read it. I’ll wait.
Back? Great. Now, go watch this Google video explaining two-step verification. Don’t follow the directions yet — just watch it and come on back here, and I’ll walk you through it. Take your time.
All done? Okay.
Two-step verification, then, pairs a password with a unique numeric code that exists in another physical location (the phone or mobile device, or the printed list of codes). In order to log in to Gmail once two-step verification is enabled, you need both of these pieces of information. Banks commonly use this system to verify their customers. World of Warcraft also provides an authentication option that works the same way — you need both a password and a unique code that gets generated when you want to log in. The idea is that even if your password is hacked or guessed, someone still can’t get into your Gmail account without having that code also.
Google will ask you to enter this code every 30 days on a trusted computer (if you switch browsers on the same computer, or clear your cookies, Google will ask for the code again). You can also choose not to have a given computer be “trusted,” and Google will ask for your code every time you log in.
Note that if you are using Google apps, and not a regular Gmail account, you can’t use two-step verification until your site admin enables it for the site. If you follow the steps below and get stuck in the middle of Step 1 because you don’t see “2-step verification,” this is the case for you. Contact your site admin to see about getting it enabled.
Two Foot by Jack Keene. Creative Commons.
So, how does one go about it?
Let’s get started.
1. Gather what you need.
Setting this up properly will take 15 to 30 minutes, and you don’t want to get interrupted in the middle, so make sure you have enough time before you start. Grab your mobile device(s), including phones and iPads. A printer is handy but not absolutely necessary. You’ll do most of the work on your main computer. If you use more than one computer to access your Gmail account (a laptop and a desktop, or a work computer and a home computer), you’ll need to do some of the steps on each one, but you can start with just one for now.
Ready? Let’s go through the process. First, we’ll enable 2-step verification. We’ll set up apps and devices, and then set up backup options for our account.
Start by logging in to Gmail as you normally would, on your computer (not on a mobile device).
2. Enable 2-step verification for your Gmail account.
In Gmail on the computer, click on your name and the plus sign at the upper left of the screen (for example, mine says “Rachel+”). This takes you to your Google+ profile. Click the gear icon in the top right and choose Settings from the drop down menu.
If you haven’t set up Google+, you can get to your profile by clicking your email address in the top right and then clicking “Account.”
Click Security on the left.
See where it says “2-step verification”? Click “Edit” to bring up the setup wizard.
Step through the wizard and have it send a code to your phone. Look at your phone for the text message (or voice message, if you prefer) from Google. Then enter that code on the computer screen. Ta da! Google takes you to a new screen. Stay there for the next step.
3. Enable access from mobile devices.
Here’s the tricky bit: some things that you have already set up to access Google can’t do the two-step, so you have to set up special passwords for those things. You’ll do that next (do it now, even though Google gives you the option to do it later). This includes email programs on your phone, email clients like Outlook and Thunderbird, calendar clients, chat clients, and so on. Read on.
The top of the screen you are looking at lists things that you have connected to your Google account. Take a moment to look over the list of stuff that has permission to access your Google account (or that you opted to sign in to using your Google ID), and revoke access for anything you’re not still using. You can leave the rest alone. Now, look at the lower half of the screen for the next part.
You’ll need to generate bizarre application-specific passwords for all the places that you access Google other than your computer. For instance, if you use the mail program on your iPhone or iPad to get your Gmail, you need to make a special password for those devices. Google makes this very friendly and easy, and you don’t need to make up the passwords yourself or remember them after you type them in once. Before you start, go get your iPhone, Android phone, Blackberry, iPad, or whatever other devices you want to set up, and have them handy. You’ll need them.
Got everything handy? Now, look back at the bottom half of the computer screen. (If you wandered off to collect your devices, Google may ask you to log back in when you try to do the next step. Just enter your email and password as usual and you’ll be right back on track.) In the list on the bottom of the screen, you’ll see a text box and a button.
For each device, type a descriptive name in the text box so you know what it is later (like “Gmail on my iPhone” — spaces, caps, whatever you like is OK) and then click “Generate Password.” Now leave your computer alone for a minute and pick up the device — let’s say it’s your iPhone. Open the settings app on the iPhone. Click the “Mail, Contacts, Calendars” item in the settings list, and then tap the name of your Gmail account in the list of accounts. Tap again where it says “Account” with your Gmail address. On the device, erase the password that’s in there — that is still your Gmail password, but this device can no longer use it because of the two-step verification process. Now look back at your computer screen, and find the string of characters that Google has generated for you. Type them into the password field on your device. You can omit the spaces if you want. Click Done on the device. The iPhone will verify the information, and when it’s successful, you’ll see a row of checkmarks in all those fields on the iPhone. Click Done again on the device, and your device is set up. Ta da!
To set up the next one, click Done on the computer screen and you’ll get a new text box. You’ll also see that the device that you just set up is listed there now with the name you gave it.
Do the same thing for your iPad and any other physical devices you use to access your Gmail.
4. Enable access from other apps.
Next, we’ll set up other apps besides Mail. Examples of apps you might need to change are Spanning Sync, Google Notifier, Outlook, chat clients like Adium and Google Talk, and so on. These might be apps on
your computer, or they might be on your mobile phone. If you don’t use any of these, you can skip this part. If you try to access something later and it says that your Gmail password isn’t working, come on back and follow these instructions for that app.
In the same place where you set up your iPhone, iPad, Blackberry, or what have you, type in a name for the app you will be authorizing (“Spanning Sync,” for instance). Click “Generate Password.” Leave that screen up, and open the preferences for the app you are changing. Find where you put in the password, erase the password that’s in there, and put in the new weird one that Google has generated for you (spaces optional, again). Click “Done” or “OK” or the moral equivalent both in the app and on the Google screen, and you’re good to go.
4.5 Ack! I came back to do this part later and I can’t find the settings page with the text boxes!
In Gmail, click your name with the plus (“Rachel+” for me) in the upper left. Look on the right for the little gear and click it. Choose Settings from the drop down menu.
If you haven’t set up Google+, you can get to your profile by clicking your email address in the top right and then clicking “Account.”
Click Security in the menu on the left. Click the Edit button next to Authorizing Applications and Sites. Enter your password (your usual Gmail one) if prompted. There you are!
5. More information from your friends at Google.
Now, check your email. Gmail has sent you a helpful message full of useful details. It also contains action items:
1. Set up your backup phone. If your mobile gets lost or stolen, you can use the backup phone to receive a verification code. Click the link in the email, then click “Add a phone number” on the page it takes you to, and enter the backup phone number. If it’s a landline, be sure to select “voice call” and not “SMS/text message” as the delivery method.
2. Print a set of backup codes. Print these out, and even if you’re unable to access either phone, you can still use a verification code to get back into your account. Just carry these with you when you travel. If you don’t have a printer handy, you can save them to a text file and print them later. Follow the directions in the email to get these codes.
3. Optional: set up the Google Authenticator mobile app. If you like, you can get the Google Authenticator app for your mobile that will generate a code you can use, whether or not you have cell service. (This is great if you travel overseas.) If you want to do this, you need to get a free app from the app store and then set up your app using the online instructions. Click the link in the email for the type of mobile you have to get started, then just follow the on-screen instructions. You can configure the app to work with multiple Gmail accounts, if you have more than one.
Save the email from Google for later, just in case.
That’s it! Now your account is protected with two-step verification.
Huh. What behavioral changes will we have to put up with now?
Every 30 days, Google will ask you to log in again. After you enter your password, it will ask for a verification code. You can have that code texted to your mobile, or you can use the Authenticator app to generate one, depending on what option you selected when you set it up. If you change your mind about how to get the code, you can change that in your settings (see “4.5, Ack!” above for how to find your settings).
Something weird happened, or I have more questions.
Google has a great help system that covers 2-step verification.
This post is dedicated to my mom and my sister, with lots of love. Go do it now, guys.
Updated 8/8/12: Added instructions for folks who don’t use Google+.
Last week, I was privileged to attend part of the Creative Leadership Academy held at The Boulders in Carefree, Arizona. I listened to inspiring talks by “provocateurs” Chris Waugh (IDEO) and Luke Williams (Frog Design fellow and author of Disrupt), and I participated in the workshop Cultivating a Kaleidoscope Mind, presented by Laura Seargeant Richardson and Ben McAllister of Frog Design. I also delivered the closing workshop, Visual Meetings and Teams: The Key to Practical Application of Creative Leadership.
Chris Waugh spoke about experience design after the reception on Tuesday evening (tough slot). He captured our attention by providing foam missiles and inviting a few intrepid volunteers to step up on stage to experience what a design critique often feels like — we stood there while the rest of the room pelted us with the rubber band-propelled missiles. I found it strongly reminiscent of my college courses in studio art. Chris showed examples of strikingly user-friendly or innovative product design and told the story behind each one. Unfortunately I hadn’t brought my iPad to the reception, so I didn’t take notes during his excellent talk.
The workshop from Frog invited us to come up with unusual ideas about how to change the conference itself. Each attendee received a set of cards with their registration materials that prompted them to jot down observations throughout the conference, such as noticing interactions between people or what the environment was like. During the workshop, we were given a framing question that took us out of the conference mindset (“What if the conference were a dinner party? What if it were a circus?”) and asked to review our observations in light of the framing question to see what ideas would emerge. Then we dot-voted on the ideas to select the ones we liked the best, and presented the top two or three with a title, a sketch, and a brief description. I took notes during the first part of the presentation:
The reference to the chicken foot is a reminder to find one thing that is so fascinating that you could draw it over and over, from many different angles, to explore its nature. (Laura had this experience with a chicken foot.) It was illuminating to contrast thoughts about the conference with such a variety of other ideas. My favorite juxtaposition was thinking about attendee participation in terms of the conference as a game. Hmm…
Luke Williams’ talk was about disruptive design, and he spoke about the steps or stages of disruptive design. I did take notes during this session:
By the time my workshop rolled around, everyone in the group was filled to the brim with ideas about creative leadership. I gave an introduction to Visual Meetings using the presentation David Sibbet created with Prezi, and then the plan was to map out our collective learning journey describing how to implement all the wonderful ideas from the past three days. There was a gentle mutiny, though, and instead we practiced drawing seed shapes (star people and other basic icons). I think everyone was pretty tapped out by then, but they all jumped in and practiced the drawings, and the energy level in the room just shot up. We also talked about using the iPad for graphic recording, which wasn’t formally on the agenda, but somehow someone always asks about it anyway. I was assisted during the workshop by my amazing and talented sister, Sonja Stone (the author). It was a great group of folks, and we definitely achieved the session objective of having a good time!
Overall, I appreciated the practical advice given by the other speakers about how to be creative. I know that sounds a little counter-intuitive, but creativity is often sparked by thinking about old ideas in new contexts, and the Academy demonstrated lots of different ways to achieve that.
Friday’s Digital Tools for Graphic Recording workshop was recorded, and you can view the streaming archive here. It’s a WebEx recording, so you may need to download a client to view it.
I apologize in advance for the brief periods where my screen and I vanish (it happens twice). Don’t worry — I come back 🙂 I’m hoping to be able to edit those out eventually, but at the moment, I’m still trying to work out how to edit a WebEx recording — I can adjust the start and end times, or at least I could if I had a PC and not a Mac, but I can’t change anything in the middle! (And trust me, there’s quite a lot I could safely edit out…)