+ All Categories
Home > Education > Hacker School talk - Learning for Hackers

Hacker School talk - Learning for Hackers

Date post: 16-Jul-2015
Category:
Upload: mel-chua
View: 257 times
Download: 0 times
Share this document with a friend
Popular Tags:
48
Learning Learning research research for hackers for hackers (hacker school w2015) (hacker school w2015)
Transcript
Page 1: Hacker School talk - Learning for Hackers

Learning Learning researchresearchfor hackersfor hackers

(hacker school w2015)(hacker school w2015)

Page 2: Hacker School talk - Learning for Hackers

school

hacking

Page 3: Hacker School talk - Learning for Hackers

ProductivelyProductivelyLostLost

Page 4: Hacker School talk - Learning for Hackers

uredoin

itrite

CC-BY-SA from http://www.flickr.com/photos/ykjc9/4143179870

Page 5: Hacker School talk - Learning for Hackers

This talk's big ideas1. A member of the hacking community is a hacker.2. Design learning like code.3. The Chipotle Coding Menu4. How learning works (we think)

Page 6: Hacker School talk - Learning for Hackers

1A HackerA Hackeris someoneis someonethat other that other hackershackers

call a hacker.call a hacker.

Page 7: Hacker School talk - Learning for Hackers

Community of Community of practice.practice.

domaindomaincommunitycommunitypracticepractice

Page 8: Hacker School talk - Learning for Hackers

In a cognitive In a cognitive apprenticeship within a apprenticeship within a community of practice...community of practice... zone of zone of proximal developmentproximal development

legitimate peripheral legitimate peripheral participationparticipation

Page 9: Hacker School talk - Learning for Hackers

Zone of proximal development:

learning to bike

Zone of proximal development:

learning to bike1. watching2. somebody pushes you3.wheeeeeeeeeeeeeeeeeeeeeeee

Page 10: Hacker School talk - Learning for Hackers

Zone of proximal development:

learning to program

Zone of proximal development:

learning to program1. watching2. pairing, code review, etc3.wheeeeeeeeeeeeeeeeeeeeeeee

Page 11: Hacker School talk - Learning for Hackers

MYTHS:not skilled enoughnot skilled enough

not technical enoughnot technical enough(perhaps later but (perhaps later but

surely not now)surely not now)

Page 12: Hacker School talk - Learning for Hackers

CC-BY http://www.flickr.com/photos/pasukaru76/5060447506

Legitimate Peripheral Legitimate Peripheral ParticipationParticipation

Legitimate Peripheral Legitimate Peripheral ParticipationParticipation

these are the jobs these are the jobs you're looking foryou're looking forthese are the jobs these are the jobs you're looking foryou're looking for

Page 13: Hacker School talk - Learning for Hackers

LPP Task CriteriaLPP Task Criteria

1. mission critical (no)2. we have no time (YES)3. nobody really cares (no)

Page 14: Hacker School talk - Learning for Hackers

Situative

Page 15: Hacker School talk - Learning for Hackers

bit.ly/pycon-eduhistorybit.ly/pycon-eduhistorybit.ly/pycon-eduparadigmsbit.ly/pycon-eduparadigms

Page 16: Hacker School talk - Learning for Hackers

2Design your Design your learning learning

the way you the way you design your design your

code.code.

Page 17: Hacker School talk - Learning for Hackers

Example 1: This project is a text editor, mail and news reader,

debugger, project planner, calendar, and natural language

processing demo for simulating a human.

Example 2: This project is a distributed version control system

designed to handle everything from small to very large projects with

speed and efficiency.

Page 18: Hacker School talk - Learning for Hackers

Example: test-driven development

(shamelessly stolen from http://docs.python.org/2/library/doctest.html)

Example: test-driven development

(shamelessly stolen from http://docs.python.org/2/library/doctest.html)

def factorial(n):

"""Return the factorial of n, an exact integer >= 0.

>>> [factorial(n) for n in range(6)]

[1, 1, 2, 6, 24, 120]"""

result = 1

factor = 2

while factor <= n:

factor += 1

return result

Page 19: Hacker School talk - Learning for Hackers

Example: test-driven development

(shamelessly stolen from http://docs.python.org/2/library/doctest.html)

Example: test-driven development

(shamelessly stolen from http://docs.python.org/2/library/doctest.html)

def factorial(n):

"""Return the factorial of n, an exact integer >= 0.

>>> [factorial(n) for n in range(6)]

[1, 1, 2, 6, 24, 120]"""

result = 1

factor = 2

while factor <= n:

factor += 1

return result

What should it do?What should it do?

How will I knowif it's done?

How will I knowif it's done?

Okay, let's do it.Okay, let's do it.

Page 20: Hacker School talk - Learning for Hackers

Example: test-driven learning

bit.ly/test-driven-learning

Example: test-driven learning

bit.ly/test-driven-learningdef learn_factorial(n):

"""Be able to implement a factorial function with doctests.

>>> is_blog_post_with_git_commit_done()

True"""

read_tutorial(fa)

pair_program(Mary)

push(code, github)

ask_for_help(Julia, blogging)

ContentContent

AssessmentAssessment

PedagogyPedagogy

Page 21: Hacker School talk - Learning for Hackers

Content you care aboutMotivation (Deci, Ryan)

Content you care aboutMotivation (Deci, Ryan)

1. amotivation2. external regulation3. identified regulation4. intrinsic motivation

autonomyrelatedness

competence

(thanks to Jon Stolk, Rob Martello, Mark Somerville, and the Olin College I2E2 crew)

(thanks to Jon Stolk, Rob Martello, Mark Somerville, and the Olin College I2E2 crew)

Page 22: Hacker School talk - Learning for Hackers

CC-BY http://www.flickr.com/photos/katrzyna/69324073

assessmentassessmentassessmentassessment

Formative: cookingFormative: cookingSummative: servingSummative: serving

Page 23: Hacker School talk - Learning for Hackers

3The ChipotleThe ChipotleCoding MenuCoding Menu

Page 24: Hacker School talk - Learning for Hackers
Page 25: Hacker School talk - Learning for Hackers
Page 26: Hacker School talk - Learning for Hackers
Page 27: Hacker School talk - Learning for Hackers

RelationshipRelationshipProduct Diagnostic Collaborative

Confrontational

Page 28: Hacker School talk - Learning for Hackers

ContentContent

[Test Driven Learning goal goes here]

Page 29: Hacker School talk - Learning for Hackers

TechniqueTechniqueModeling

ScaffoldingCoaching

Yes-AndingRubber-Ducking

Page 30: Hacker School talk - Learning for Hackers

ExtrasExtrasLearning style?Motivation type?

Skill level?

Page 31: Hacker School talk - Learning for Hackers

4How learning How learning worksworks

(as far as we (as far as we know)know)

Page 32: Hacker School talk - Learning for Hackers

CC-BY-SA by woodleywonderworks (http://www.flickr.com/photos/wwworks/2985216277/)

novice

Page 33: Hacker School talk - Learning for Hackers

CC-BY-SA by eschipul (http://www.flickr.com/photos/eschipul/278768722/)

expert

Page 34: Hacker School talk - Learning for Hackers

Dreyfus Model of Skill Acquisition

Dreyfus Model of Skill Acquisition

Novice – Competent – Proficient – Expert

Page 35: Hacker School talk - Learning for Hackers

clarityclarity constraintconstraint

freedomfreedom frustrationfrustration

clarityclarity constraintconstraint

freedomfreedom frustrationfrustrationCC-BY-SA by ginnerobot (http://www.flickr.com/photos/ginnerobot/4487647471/) CC-BY by NatalieMaynor (http://www.flickr.com/photos/nataliemaynor/2539937014/)

Page 36: Hacker School talk - Learning for Hackers

Why?Why?

Because Piaget.

Page 37: Hacker School talk - Learning for Hackers

Piaget In One SlidePiaget In One Slide

assimilation: adding another moduleaccommodation: REFACTOR

EVERYTHING

Page 38: Hacker School talk - Learning for Hackers

assimilation

---------accommodation------------------------

assimilation

Page 39: Hacker School talk - Learning for Hackers

Piaget + Dreyfus = Spiral learning

Piaget + Dreyfus = Spiral learning

Page 40: Hacker School talk - Learning for Hackers

Learning Over Time (Fullan)

Learning Over Time (Fullan)

Page 41: Hacker School talk - Learning for Hackers

Cognitive

Page 42: Hacker School talk - Learning for Hackers

Interleave (related stuff)Separate (in time)Struggle (like a muscle)

Interleave (related stuff)Separate (in time)Struggle (like a muscle)

How to learn deeply

Build habits by reflecting.

Page 43: Hacker School talk - Learning for Hackers

Attribution theory (Dweck)

Attribution theory (Dweck)

Fixed vs Growth mindsetsaka

Nature vs Nurture

Page 44: Hacker School talk - Learning for Hackers

FAIL #1: Assumption of privilege

FAIL #1: Assumption of privilege

If it's hard, something's wrong with me

vsIf it's hard, something's wrong

with it (I can fix that!)

Page 45: Hacker School talk - Learning for Hackers

I (think I) canSelf-efficacy (Bandura)

I (think I) canSelf-efficacy (Bandura)

1. doing it2. seeing people (like me) do it3. social persuasion4. your own body

(Bandura also did social learning, which is a lot of fun – look it up!)

(Bandura also did social learning, which is a lot of fun – look it up!)

Page 46: Hacker School talk - Learning for Hackers

Daphne's QuestionsDaphne's Questions● What are you trying to do and how will you

tell that it’s working?● What does this part do? What happens

when you take it out?● What does this function do? What would

you use it for somewhere else? Where is it called?

● Why are you taking this approach?● Why are you working on this?

http://blackfemalecoders.tumblr.com/post/63601111261/on-becoming-a-confident-hacker

http://blackfemalecoders.tumblr.com/post/63601111261/on-becoming-a-confident-hacker

Page 47: Hacker School talk - Learning for Hackers

uredoin

itrite

CC-BY-SA from http://www.flickr.com/photos/ykjc9/4143179870

Page 48: Hacker School talk - Learning for Hackers

ProductivelyProductivelyLostLost


Recommended