Vernier, NSTA Technology Awards Go to 7 Educators

The 2016 Vernier/National Science Teacher Association (NSTA) Technology Awards have gone to seven teachers, ranging from one teaching fifth-graders to a college professor.

The seven educators — one elementary school teacher, two middle school teachers, three high school teachers and one college-level educator — received awards for their innovative use of data-collection technology using a computer, tablet or other handheld device in the science classroom.

The winners received $1,000 in cash, $3,000 in Vernier products and up to $1,500 in expenses to attend the NSTA National Conference in Nashville.

"We believe providing opportunities for science students to engage in practical experience will better prepare them for real-world science exploration," said Vernier Software & Technology CEO John Wheeler.

The winners are:

  • Sherie Ryan-Bailey, of Oakley Elementary School. Using Vernier probes, a weather station and resources from a local university, Ryan-Bailey's fifth-grade students learned weather patterns and how different factors influence weather conditions in their area.
  • Greer Harvell, of Walton Middle School. Harvell's seventh-graders used Vernier's probeware to act as "citizen scientists" and monitor the water quality of a lake located less than a block from their middle school.
  • Aaron Mueller, of Scullen Middle School. Mueller's cross-grade-level collaborative project encouraged students to use Vernier probeware to explore the causes of non-point source pollution in retention ponds and natural waterways near their school.
  • Richard Erickson, of Bayfield High School. Erickson and his students spent the school year investigating the seiches in Lake Superior, a standing wave oscillation created by atmospheric forces.
  • Dan Starr, of Green Lake School. Starr's students used Vernier data-collection technology to study the Big Green Lake's water resources and determine which management decisions are necessary to improve the watershed.
  • Ben Smith, of Peninsula High School, Smith's project encouraged students to launch inquiry-based field and laboratory investigations that explore the relevance of insects to fundamental ecological issues.
  • Kasey Wagoner, of Philadelphia University. Wagoner, a physics professor, created a project-based physics course for non-science majors that incorporates Vernier probes and software.

About the Author

Michael Hart is a Los Angeles-based freelance writer and the former executive editor of THE Journal.

Featured

  • cloud and circuit patterns with AI stamp

    Cloud Management Startup Launches Infrastructure Intelligence Tool

    A new AI-powered infrastructure intelligence tool from cloud management startup env0 aims to turn the fog of sprawling, enterprise-scale deployments into crisp, queryable insight, minus the spreadsheets, scripts, and late-night Slack threads.

  • human figures surrounded by precise arcs with book and gear icons

    Kennedy-King College Rolls Out Holistic Student Support Program

    Chicago's Kennedy-King College is expanding student support services through a collaboration between City Colleges of Chicago and One Million Degrees (OMD), a Chicago-based nonprofit serving low-income community college students.

  • college students in a classroom focus on a silver laptop, with a neural network diagram on the monitor in the background

    Report: 93% of Students Believe Gen AI Training Belongs in Degree Programs

    The vast majority of today's college students — 93% — believe generative AI training should be included in degree programs, according to a recent Coursera report. What's more, 86% of students consider gen AI the most crucial technical skill for career preparation, prioritizing it above in-demand skills such as data strategy and software development.

  • laptop and fish hook

    Security Firm Identifies Generative AI 'Vishing' Attack

    A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.