tag:blogger.com,1999:blog-28704349505851325732024-03-05T00:53:07.740-08:00Technology EducationOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.comBlogger21125tag:blogger.com,1999:blog-2870434950585132573.post-85045194202219719522011-02-24T10:52:00.000-08:002011-02-24T10:57:51.278-08:00Obsolete and Emerging Technology - Cloud Computing<div style="color: #0b5394; font-family: Verdana,sans-serif;"><a href="http://www1.kingsborough.edu/oh/"> </a><br />
<div style="color: #0b5394; font-family: Verdana,sans-serif;"><span style="font-size: x-large;"><a href="http://www1.kingsborough.edu/oh/">Click to view video</a></span></div></div><br />
<b>Presentation Transcript</b><br />
<br />
Slide 1: Introduction<br />
<br />
Slide 2: Obsolete and Emerging Technology<br />
<br />
Dr. Thornburg (2009) states that an emerging technology means different things to different people because it depends on the technological use of the tool in everyday practice. Therefore, the term “emerging” is relative to each community where the tool is being used. For this presentation, I will evaluate an obsolete and an emerging technology used in the workplace; concentrating on the <b>storage and transfer of data</b>.<br />
Historically humans attempted to discover a better way to store data from storing scrolls in pottery, to current emerging technology where it is stored via cloud computing.<br />
<br />
Slide 3: Data storage<br />
<br />
In the last few years, the idea of cloud computing has taken over individuals and organizations.The way we save and backup our files are changing, which is opening new doors to collaboration among professionals, students, and organizations. Our storage media has evolved from floppy disks, CDs, flash drives, external hard drives and other storage devices. <br />
<br />
With the cloud, there is no need to carry all of the files and there is no threat of the loss of a storage media, which translates into lost work. Now, it all “sits” on a cloud in a centralized location, which can easily be retrieved with an Internet connection. <br />
<br />
Even though some types of cloud computing are free or less expensive infrastructure operations and maintenance environment options for educational organizations, it is not yet a commonly supported tool and it is still considered an emerging technology by some.<br />
<br />
<br />
Slide 4: Data storage historical overview<br />
<br />
Slide 5 What is Cloud Computing?<br />
<br />
It consists of the delivery of application, infrastructure, and storage over the Internet based on client demand.<br />
<br />
A cloud computing network can contain public, private, or hybrid clouds (a combination of both public and private).<br />
<br />
Cloud computing can remove many of the limitations found in a conventional computing environment, such as: space, time, power, and cost.<br />
Slide 6 : Cloud Computing<br />
<br />
Cloud computing not only changes how we store and retrieve applications and files, but also how we communicate and share them with other members of our group, and how organizations restructure and modernize their IT infrastructure. <br />
<br />
<br />
<br />
An example is <a href="http://dropbox.com/">Dropbox.com</a>, a free website where users can save files on the cloud, and which also allows users to share particular files with others and to retrieve them from any mobile device.<br />
<br />
Slide 7: DropBox.com<br />
<br />
Slide 8: <i>McLuhan's Laws of Media</i><br />
<br />
By looking at tetrads, we can see that there is a connection between obsolete and emerging technology as the tool is in constant progression. <br />
<br />
<br />
<br />
Dr. Thornburg (2008) states: “The ‘new’ drives an older technology into obsolescence” (p.2); meaning that every emerging idea is constructed on a previous one. The retrieval part of the tetrad is an example of how even ancient tools set the stage for current technological ideas. <br />
<br />
<br />
<br />
Each emerging technological advance is also dependent on additional factors and technological advances<br />
<br />
<br />
<br />
Slide 9: McLuhan’s Tetrad<br />
<br />
McLuhan’s tetrad forces you to think about artifacts in a new way making you more aware of new technologies as they emerge” (Thornburg 2009). <br />
<br />
<br />
Technology planning is an important factor for any IT personnel in any organization. McLuhan Tetrad is helpful with regards to looking at emerging and emerged technology from different perspectives, and asking questions such as is this technology beneficial to learners and how can it evolve.<br />
<ul><li>McLuhan's tetrad asks four questions that determine the technologies affect on the workplace and society. The four questions are:</li>
<li>What does this technology enhance?</li>
<li>What does it obsolete?</li>
<li>What does it retrieve?</li>
<li>What does it reverse? </li>
</ul>Slide 10: Obsolete Technology Tetrad<br />
<br />
Slide 11: Emerged Technology Tetrad <br />
<br />
Slide 12: Interview with IT Specialists and <br />
<br />
Decision-Maker Mr. Asif Hussain, Kingsborough’s Chief Information Officer (CIO) Mr. Hussain has incorporated many technological changes and improvements at Kingsborough Community College, Brooklyn, NY. One of his initiatives was the integration of cloud computing<br />
<br />
Slide 13: Interview Transcript with Mr. Hussain<br />
<br />
Slide 14: Video Interview with Mr. Hussain<br />
<br />
Slide 15: <b> </b>Interview with IT Specialist Mr. Kwatei Jones-Quartey, Kingsborough’s Senior Web Programmer<br />
<br />
Slide 16: <b> </b>Video Interview with Mr. Kwatei Jones-Quartey<br />
<br />
Slide 17 : Interview Transcript with Mr. Kwatei Jones-Quartey<br />
<br />
Interview Questions for IT Specialist Mr. Kwatei Jones-Quartey <br />
<ul><li>How many years have you been working at Kingsborough Community College?</li>
<li>Are you a decision-maker, a user of the technology, or both in your department?</li>
<li>What technological changes have you seen in your workplace with regards to how you store and transfer data? </li>
<li>Have these transformations affected your work?</li>
<li>Do you think it makes your work more efficient?</li>
</ul>Slide 18: Consent form<br />
<br />
Slide 19: Consent form<br />
<br />
Slide 20: Six Forces That Drive Emerging Technology<br />
<br />
<br />
<ul><li><b>Evolutionary Technology </b>(based on Moore’s Law)<br />
<br />
New ideas based on developed technology. </li>
<li><b>Rhymes of History </b><br />
<br />
New technology which has emerged due to the impact felt many years before from another technology, or when a technology rekindles something from the past. </li>
<li><b>Disruptive Technology</b><br />
<br />
One that does not create a new market, but changes the product.<br />
<br />
A new technology that disrupts existing technology and pushes it out </li>
<li><b>Science Fiction<br />
<br />
</b>Creative forces that expand and generate new creative technological ideas<b> </b></li>
<li><b>Increasing Returns</b><br />
<br />
One technology’s ability to capitalize on the popularity of other technological advances to rise and become popular. </li>
<li><b>Red Queens </b><br />
<br />
Two technologies competing for the same market share where, in the process, all other competitors are left behind (Thornburg, 2008d, p.12).</li>
</ul>Slide 21: Six Forces That Drive Emerging Evolutionary Technology<br />
<br />
Moore law- Trends in technologies in which the power of technology doubles about every 12 months. <br />
<br />
<br />
<br />
Moore’s laws are even more emphasized in current rapid technological evolvements. Not only are technological tools becoming more powerful and less expensive, but some are even free due to the cloud computing and just as powerful. <br />
<br />
<br />
<br />
The key principle of evolutionary technology is that technology is changing according to the social needs of society. <br />
<br />
<br />
<br />
The current social technological need is for technology to be easily transported, less expensive, and more efficient. Therefore, it is possible to predict future trends if we look at societal evolution.<br />
<br />
<br />
<br />
Slide 22: Six Forces That Drive Emerging Evolutionary Technology Continue<br />
<br />
The Internet was mainly developed by scientists because there was a need to share data with other scientists that were remotely located. Although researchers could use the ARPANET from 1969, it only became available to the public in 1991, which was one of the reasons for its rapid growth and development; it also opened doors to closed societies. <br />
<br />
<br />
<br />
This also led to the expansion of other technologies, which rely on the Internet and which has affected how we connect, communicate, save, and transfer data; it has even changed how we teach and learn. <br />
<br />
<br />
<br />
Social entrepreneurs are looking at social needs and of already existing tools. This allows this technology to continuously evolve.<br />
<br />
<br />
<br />
Slide 23 : Six Forces: Evolutionary Technologies on Obsolete Data Storage and Transfer Technology<br />
<br />
The evolutionary path where new technological ideas are a progression or a growth of previous ones (Thornburg, 2009).<br />
<br />
External drives became obsolete because there is no need to back up files on drives with limited storage capacity and it eliminated the need to carry the drive with you. <br />
<br />
Cloud computing allows for high capacity file storage, file sharing, and access from any device connected to the Internet.<br />
<br />
<br />
<br />
Slide 24: Six Forces: Evolutionary Technologies on Emerging Cloud Computing Storage Technology Dropbox.com<br />
<br />
Dropbox.com is a Web-based file hosting service operated by Dropbox.com Inc. that uses cloud computing to enable users to store and share files for free (there are some paid services, with varying options). The files can be retrieved from any location with an Internet connection, and it also uses mobile technology.<br />
Slide 25: Six Forces: Rhymes of History on Obsolete Data Storage and Transfer Technology<br />
<br />
Dr. Thornburg similarly describes one of the forces that drives emerging technology as “Rhymes of History.” This term is used to define a new technology which has emerged due to the impact felt many years before from another technology, or when a technology rekindles something from the past. <br />
<br />
We use the cloud computing to store, retrieve, and transmit data, in addition to communicating; and new technologies are continuously emerging. <br />
Slide 26 : Six Forces: Rhymes of History on Obsolete Data Storage and Transfer Technology and Original Emerge<br />
<br />
Rhymes of history have been continuously rekindled. Evidenced from the progression from oral communications, to storing data in pottery, to an external floppy disks, external drives and USB flash drives, to cloud computing communication and data transfer information.<br />
<br />
These are new ideas of how to save and communicate information which are built on old ideas: the need of portably storing information with easy transfer and retrieval. <br />
<br />
<br />
<br />
Slide 27 : Six Forces: Rhymes of History on Obsolete Data Storage and Transfer Technology and Original Emerge<br />
<ul><li>Limited storage space of external hard drives and the cost of maintenance of on-campus servers has created limitations. </li>
<li>The expansion of the Internet and the availability of cloud computing has opened up new opportunities for students, faculty, and staff to save their data and make it available to other. </li>
<li>Learners now have the opportunity to have an open communicational channel with their educators. </li>
<li>The rhymes of history have rekindled oral communication to current oral communications on Skype. </li>
<li>From saving data using pottery, to current emerging technology where it is stored via cloud computing. </li>
</ul>Slide 28: Six Forces: Rhymes of History on Obsolete Data Storage and Transfer Technology and Original Emerge<br />
<br />
Learners have constant access to information and educational material, and they can access applications from home. <br />
This is unlike traditional access to data, which could only be done physically on campus.<br />
Slide 29: Six Forces: Disruptive technology on Obsolete Technology’s Original Emerge<br />
<br />
Dr. Thornberg (n.d.) states that technologies sprout quickly and disrupt existing technologies. <br />
<br />
Christensen (2002) breaks down disruptive technology into two types: One that does not create a new market, but changes the product, and the other is a new technology that disrupts existing technology and pushes it out. <br />
Slide 30: Six Forces: Disruptive technology on Obsolete Technology<br />
<br />
Portable external drives were a disruptive technology because it was a new way to store files when compared to internal computer hard drives.<br />
<br />
Slide 31: Six Forces: Disruptive Technology on Emerging Technology<br />
<br />
A new technology with the same functionality of an existing technology, but which functions more efficiently is a disruptive technology.<br />
<br />
<br />
<br />
As bandwidth becomes more available, more applications are emerging. Companies using cloud computing are offering free storage space to individuals.<br />
<br />
<br />
<br />
Users can share cloud server space cooperatively, purchase applications, and share open and closed networks.<br />
<br />
Slide 32: Six Forces: Science Fiction on Obsolete Technology’s Original Emergence<br />
<br />
Science fiction technology, according to Thornburg (2009b), can prompt ideas that motivate inventors to make fictional technology reality.<br />
Slide 33: Six Forces: Science Fiction on Obsolete Technology<br />
<br />
Portable data storage and cloud computing has its beginnings in science fiction books and movies as virtual cyberspace.<br />
<br />
An example is The Minority Report movie, Isaac Asimov and the <i>Foundation</i> series, and William Gibson short story, <i>Burning Chrome</i>. <br />
Slide 34: Six Forces: Science Fiction on Emerging Technology<br />
<br />
The storage of data is taken into cyberspace, where science fiction and reality becomes distorted as people connect, save, and manage data on a “cloud.”<br />
<br />
Slide 35: Six Forces: Increasing Returns on Obsolete Technology’s Original Emergence<br />
<br />
Thornburg(2009) defines “Increasing Returns” as two technologies competing for the same market share. One of these technologies is adapted and seizes the market, even when the other has better technology (p.12).<br />
Slide 36: Six Forces: Increasing Returns on Obsolete Technology<br />
<br />
Companies such as Google and Microsoft Windows Live compete for space on the cloud. <br />
<br />
Free options are taking over as options for personal users become available such as Dropbox.com which is used for data storage and makes obsolete the use of external drives and the need to carry them around. <br />
Slide 37: Six Forces: Increasing Returns on Emerging Technology<br />
<br />
There continues to be competition as to who will dominate cloud computing.<br />
<br />
Google and Microsoft are using two different technologies. There is no need to download and install Google, unlike Microsoft ‘s products. Google is using “pure” clouding computing, where all of the documents and applications are only on the cloud; whereas Microsoft still uses traditional desktop applications in order to create and manage the data.<br />
<br />
Microsoft has signed a long contract with CUNY colleges (25 colleges) and continues to dominate in its existing market share.<br />
Slide 38: Six Forces: Increasing Returns on Emerging Technology<br />
<br />
Image of Window Life and DropBox.com<br />
<br />
Slide 39: Six Forces: Red Queens on Obsolete Technology’s Original Emergence<br />
<br />
Thornburg(2008) defines a <i>Red Queen</i> as two technologies competing for the same market share (p.12).<br />
<br />
Slide 40: Six Forces: Red Queens on Obsolete Technology<br />
<br />
The Upstartle Company used “Writely” (Web-based word processor, spreadsheet, presentation, form, and data storage service ) and was one of the first companies to have users use it’s web-based word processors and save the files on its servers. <br />
<br />
<br />
<br />
However, Google, by building upon Writely’s idea and incorporating its own already developed product of Google Spreadsheets, created Google Doc. In 2006, Google bought Upstartle (http://www.cbronline.com/blogs/technology/writely_or_wron). <br />
<br />
<br />
<br />
Slide 41: Six Forces: Red Queens on Emerging Technology<br />
<br />
Chris Anderson (2004) notes that new technologies were able to capitalize on the popularity of other technological advances to rise and become popular. <br />
<br />
By offering free online services for storing, sharing, and creating documents, Google has also become a Red Queen for Microsoft who dominated the market for doc. software which is installed on computer hard drives. <br />
Slide 42:<b> </b>Future of Cloud Computing<b><br />
<br />
</b>The file sharing and synchronization service provider Dropbox announced on Jan 20, 2010 that it has passed the 4,000,000 user milestone. <br />
<br />
Dropbox was founded in 2007.<br />
<br />
http://techcrunch.com/2010/01/20/dropbox-4-million-user/.<br />
<br />
While Dropbox functions as a storage service, it focuses on synchronization and sharing. Dropbox uses Amazon's S3 storage system to store the files. To succeed and grow in the market, companies will continue to share resources and marketing in order to stay ahead of other competitors.<br />
Slide 43: Future of Cloud Computing<br />
<br />
As more companies begin to offer services on the cloud, the cloud’s applications and services will continue to grow and improve. Businesses and private users will reduce and eliminate the need to purchase and maintain software's and hardware. Furthermore, more real time communication and collaboration would be available 24/7 .<br />
<br />
<br />
<br />
According to the research by the Pew Research Center, by 2020, most people will access software applications online and share and access information through the use of remote server networks, rather than depending primarily on tools and information housed on their individual, personal computers (http://pewresearch.org/pubs/1623/future-cloud-computing-technology). <br />
<br />
Slide 44: Reference<br />
<br />
Anderson, C. (2004). <i>Tech’s long tail</i> [Video]. Retrieved from <u><a href="http://www.ted.com/index.php/talks/chris_anderson_of_wired_on_tech_s_long_tail.html">http://www.ted.com/index.php/talks/chris_anderson_of_wired_on_tech_s_long_tail.html</a></u> <br />
<br />
Christensen, C. (2002). <i>The innovation economy: How technology is transforming existing industries and creating new ones</i> [Video]. <i>Retrieved from h t t p : / / pewresearch.org/pubs/1623/futurecloud-</i>computing-technology-experts<br />
<br />
Friedman, N. (2009). The high cost of computers? U.S. Naval Institute Proceedings, 135(3), 90−91.<br />
<br />
Kelly, K. (2007, December). The next 5,000 days of the web [speech]. Speech delivered at the EG 2007 Conference, Los Angeles. Retrieved from <a href="http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html">http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html</a> <br />
<br />
Linden Labs http://wiki.secondlife.com/wiki/Second_Life_Education<br />
<br />
Pew Internet & American Life Project. (2010, June 11). <i>The future of cloud computing</i>. Retrieved from http://pewresearch.org/pubs/1623/future-cloud-computing-technology-experts<br />
<br />
Soloway, E. (Producer). (nd). Emerging vs. emerged technologies [Audio Podcast]. <i>Laureate Education, Inc.</i> <br />
<br />
Soloway, E. (Producer). (nd). Resilience and Risk Taking in Educational Technology [Audio Podcast]. <i>Laureate Education, Inc.</i><br />
Slide 45: Reference Continue <br />
<br />
Thornburg, D. (2008). <i>Red Queens, butterflies, and strange attractors: Imperfect lenses into emergent technologies.</i> Lake Barrington, IL: Thornburg Center for Space Exploration. <br />
<br />
Thornburg, D. D. (2008a). <i>Emerging technologies and McLuhan's Laws of Media. Lake</i> <br />
<br />
Thornburg, D. (2008b). An amazingly incomplete emerging technologies bibliography. Lake Barrington, IL: Thornburg Center for Space Exploration.<br />
<br />
Thornburg, D. (Producer). (nd). Evolutionary Technologies. [Video Podcast]. Laureate Education, Inc.<br />
<br />
Thornburg, D. (Producer). (nd). Six forces that drive emerging technology. [Video Podcast]. Laureate Education, Inc.<br />
<br />
Thornburg, D. (2009). When is a Technology Emergent?. Retrieved from http://sylvan.live.ecollege.com/ec/courses/14936/CRS-WUEDUC8812-3730077/when_is_a_technology_emergent.pdf <br />
<br />
Thornburg, D. (Producer). (nd). McLuhan Tetrad. [Video Podcast]. Laureate Education, Inc.<br />
<br />
Thornburg, D. (Producer). (nd). Rhymes of history. [Video Podcast]. Laureate Education, Inc.<br />
<br />
Thornburg, D. (Producer). (nd). Six forces that drive emerging technology. [Video Podcast]. Laureate Education, Inc.<br />
<br />
Thornburg, D. (Producer). (nd). What is emerging technology? [Video Podcast]. <i>Laureate Education, Inc.</i><br />
<br />
Thornburg, D. (Producer). (nd). Disruptive Technology. [Video Podcast]. Laureate Education, Inc.Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com0tag:blogger.com,1999:blog-2870434950585132573.post-80243352762698391252011-02-18T11:34:00.000-08:002011-02-18T11:38:34.677-08:00Addressing the Digital Divide<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi-W6A3xAtat3qd_OA6hD9KjKibGJSNut5ZNcN-alygoWruNo9hMCFgP3OmWod8E-vHvI0Ybafe2KdW8ywKeE1_6gjHfpkG2zCXOKYwNRjlyJNPSkr6lyO-z1AzmNM4cCLTYJK38LTd7TY/s1600/glob.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi-W6A3xAtat3qd_OA6hD9KjKibGJSNut5ZNcN-alygoWruNo9hMCFgP3OmWod8E-vHvI0Ybafe2KdW8ywKeE1_6gjHfpkG2zCXOKYwNRjlyJNPSkr6lyO-z1AzmNM4cCLTYJK38LTd7TY/s200/glob.jpg" width="143" /></a></div><br />
Although, we all discuss the importance and the positive effects of educational technology on learners, it is easy to overlook the schools and the learners who are still struggling with some technology that many of us may consider obsolete. We don’t have to look at impoverished countries to see the level of the digital divide; we can even find it here, at home in major cities in the U.S. The technological divide is not only present among American schools, but also as to how our students are rated when compared to other countries. The goal of education is to have our students compete not only in the local job market, but also globally.<br />
<br />
A group of leading educational organizations around the world are collaborating as part of the Global Learning Consortium to construct an outline of Digital Learning Services Standards to conform to new standards of educational technological tools. Currently, Florida Virtual School and the New York City Department of Education are supporting this framework (<a href="http://www.imsglobal.org/" style="color: blue;">http://www.imsglobal.org/</a>). This can help in generating some technological standards, which can affect how technological tools are distributed in schools and incorporated successfully as part of a learning environment.<br />
<br />
For my multimedia presentation, I looked at cloud computing, where some of the tools are almost free or free. However, as Dr. Soloway noticed, the problem of open source technology is that many schools don’t have the infrastructure to support these technologies. Surprisingly, many times it will be a teacher considered to be “knowledgeable in computers,” or some other volunteer. The blame will be on the technology rather than on the insufficient time and knowledge to maintain it.<br />
<br />
The BBC (17 January 2011) published an article regarding a UK government scheme to promote million of users in the UK to use the Internet, by offering free support through centers, selling cheap computers, offering IT training, and even promoting a computer recycling scheme. The article states that, according to a research, “going online can save people around £560 a year and that thousands of jobs are offered exclusively online” (<a href="http://www.bbc.co.uk/news/technology-12205412" style="color: blue;">http://www.bbc.co.uk/news/technology-12205412</a>). However, what will happen when the finances for this initiative run out? Many new users will have technology they cannot use, and will return to the main problem of how to continuously support the infrastructure. This reminds me of another government program, the cash for clunkers car-buying stimulus bill, where there was a divide between who can afford a new car and who cannot! <br />
According to Pew research, there are more users of cell phones than desktops. Therefore, Dr. Soloway suggests incorporating smart-phones as an educational tool, which can be the most feasible solution to incorporating technology. <br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx0llW4w_R2pVUqt-bQ8-EERsI8pay9v7pUHmAaOfk8SFTt3kLNOuiz9vdFhv8kORfnquu9J5ut-Z3fGzzPG3533O7VudKYqE7ZfUa-xDWqqyusC-IwA01RPaVbS9pebrK2NXyCTEGCD4w/s1600/divide.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx0llW4w_R2pVUqt-bQ8-EERsI8pay9v7pUHmAaOfk8SFTt3kLNOuiz9vdFhv8kORfnquu9J5ut-Z3fGzzPG3533O7VudKYqE7ZfUa-xDWqqyusC-IwA01RPaVbS9pebrK2NXyCTEGCD4w/s400/divide.bmp" width="400" /></a></div><br />
<br />
<div style="text-align: center;"><span style="font-size: small;">(<a href="http://pewinternet.org/Reports/2011/Generations-and-gadgets.aspx">http://pewinternet.org/Reports/2011/Generations-and-gadgets.aspx</a>)</span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYXklw09WywvVn0r4KrEbMUAotfUSoIuuUXiqoZGCdUfn4KJ0W2yLAeNxmSAeZaXpqy_JddRfBiMjcuygI0rbXPHWseAfto8WWnNJtXMPrSpYWLlPd-1yXbqTcqPt0T3ljma2CsvWHn5DC/s1600/useoftecdevices.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="350" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYXklw09WywvVn0r4KrEbMUAotfUSoIuuUXiqoZGCdUfn4KJ0W2yLAeNxmSAeZaXpqy_JddRfBiMjcuygI0rbXPHWseAfto8WWnNJtXMPrSpYWLlPd-1yXbqTcqPt0T3ljma2CsvWHn5DC/s400/useoftecdevices.jpg" width="400" /></a></div><br />
<br />
According to the graph and chart, smart phones and hand-held devices will send desktop PCs to the obsolete area on the McLuhan's Tetrad and they will be the better option for providing a connection through the Internet. Furthermore, by incorporating into the classrooms, it can be seen as a breaker of the “have and have-not” technological tools. <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX7LQKoluZBZMH0bqhoFXyIrKeIVLCqYNcQw2HOK17CQnI95RNzFUsWI-oO-w1WThbDuF8kkp3aBgdmB7tpfCH5gJfbGx1tfhmmbT_i_QJiANEVdXeIz2fiYAx-kt1TlJ4VG-9iknPfmSm/s1600/smartphones.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX7LQKoluZBZMH0bqhoFXyIrKeIVLCqYNcQw2HOK17CQnI95RNzFUsWI-oO-w1WThbDuF8kkp3aBgdmB7tpfCH5gJfbGx1tfhmmbT_i_QJiANEVdXeIz2fiYAx-kt1TlJ4VG-9iknPfmSm/s1600/smartphones.jpg" /></a></div>A good example of how mobile technology is opening social networks for education is observed in an article published by Erin Conway-Smith (July 22, 2010). “Teaching with Cell Phones” in South Africa shows an impoverished neighborhood where students can connect through the Internet to any math volunteer tutor locally or globally. The article “Cell phone learning”, states that it uses the students’ own technology, which is always at hand. According to Vosloo’s research, among urban youth, 90 percent have access to cell phones and around 70 percent of those are GPRS-enabled phones, which are preferred for mobile learning”<br />
(<a href="http://www.globalpost.com/dispatch/education/100720/south-africa-teaching-cell-phones" style="color: blue;">http://www.globalpost.com/dispatch/education/100720/south-africa-teaching-cell-phones</a>).<br />
<br />
<br />
Reference: <br />
<br />
Soloway, E. (n.d.) The digital divide: leveling the playing field [Podcast]. Retrieved from http://sylvan.live.ecollege.com/ec/courses/14936/CRS-WUEDUC8812-3730077/EDUC_8848_PK_Transcript.pdf<br />
<br />
Thornburg, D. (2009). Diversity and Globalism. Laureate Education, Inc. Retrieved from http://sylvan.live.ecollege.com/ec/crs/default.learn?CourseID=4199715&Survey=1&47=5828341&ClientNodeID=984645&coursenav=1&bhcp=1Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com2tag:blogger.com,1999:blog-2870434950585132573.post-81677676106835507602011-01-31T10:44:00.000-08:002011-01-31T11:05:33.826-08:00Red Queens and Increasing Returns<div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: center;"><span style="font-size: x-small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLBxXPIoTYJSn4lN3kMbG8_ZgPk-Q7xFS2Gj4wI4l5XaBViHypLqQdCrDzuZKP_GdmF1xPcU2Oqn9yLp67ZuJu_Qd3R6-slBOwEYgklrFe_gx6aAuXAQLA2t6UiLdD7HSfgfJ9DAJDTtBl/s1600/redqueens.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLBxXPIoTYJSn4lN3kMbG8_ZgPk-Q7xFS2Gj4wI4l5XaBViHypLqQdCrDzuZKP_GdmF1xPcU2Oqn9yLp67ZuJu_Qd3R6-slBOwEYgklrFe_gx6aAuXAQLA2t6UiLdD7HSfgfJ9DAJDTtBl/s320/redqueens.jpg" width="320" /></a></span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Thornburg (2008) defines a <b><span style="color: #cc0000;">Red Queen</span></b> as two technologies competing for the same market share where in the process all other competitors are left behind (p.12).</span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Two years ago, when I had to review movies for my undergraduate media class, I had to go to a movie rental store, now I just watch the selected movie digitally on my computer using Netflix. In "<a href="http://www.ted.com/index.php/talks/chris_anderson_of_wired_on_tech_s_long_tail.html" style="color: blue;">Tech’s Long Tail</a>," Chris Anderson (2004) notes that new technologies such as Netflix were able to capitalize on the popularity of other technological advances to rise and become popular. Netflix is the Red Queen in the movie rental business, because it used an existing rental market, and was able to understand the when and where the technology was heading. The development of DVDs popularized the home movie theater and because of the DVD size, it was easy to mail, which made Netflix the Red Queen. Currently, many movies can be streamed directly to TVs or computers from Netflix, which will eventually most likely be transferred to an online streaming option which will lessen the cost of mailing. However, this will occur according to what the agreement between Netflix and the move companies will be. Currently, since movies' large profit margin is in DVD sales, Netflix has agreed not to rent new movies for 28 days. </span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;"><br />
</span></div><div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: center;"><span style="font-size: x-small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn8r37YpDZFLCjee8j_f1qwJSB56WWLrCuHyV5OGqz-zz5l0Opo3Gje4kRynbAY2kC7z4B3LBLHygZiFfrkgHehWpOK6rB2So5IIhL2XHxUitCPGkjEWPUH_gO8KsMGqoPC1R_Wh8T7R2r/s1600/netflix.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn8r37YpDZFLCjee8j_f1qwJSB56WWLrCuHyV5OGqz-zz5l0Opo3Gje4kRynbAY2kC7z4B3LBLHygZiFfrkgHehWpOK6rB2So5IIhL2XHxUitCPGkjEWPUH_gO8KsMGqoPC1R_Wh8T7R2r/s1600/netflix.jpg" /></a></span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Netflix continues to be the Red Queen in the movie renting business as it surpasses its competitors and adds new features. The latest one is the ability to add, with no additional cost for its members, Netflix' Apps for iPhone and iPod touch which would allow members to stream movies (<a href="http://wn.com/News_Update_Netflix%27s_App_For_iPhone_Now_Allows_Video_To_Stream_To_TV" style="font-color: blue;">http://wn.com/News_Update_Netflix's_App_For_iPhone_Now_Allows_Video_To_Stream_To_TV</a>). Netflix is currently partnered with Amazon and both companies have increased their business, by also adding the ability to purchase new releases online, using Amazon's cloud computing (<a href="http://www.techflash.com/seattle/2010/05/netflix_on_amazon_cloud.html">http://www.techflash.com/seattle/2010/05/netflix_on_amazon_cloud.html</a>).<br />
</span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">On McLuhan’s tetrad, DVDs are currently on the Enhance tetrad and the video-on-demand option is currently in the Reverses tetrad. However, as Netflix continues to move to other clouds (Amazon, with option to purchase new releases), in the near future, the tetrads will shift and video-on-demand will shift to enhance the tetrad as DVDs will move to Obsolete tetrads and as their will not be a need to leave the house to purchase and view a movie. </span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Reference: </span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Anderson, C. (2004). Tech’s long tail [Video]. Retrieved from <a href="http://www.ted.com/index.php/talks/chris_anderson_of_wired_on_tech_s_long_tail.html" style="color: blue;">http://www.ted.com/index.php/talks/chris_anderson_of_wired_on_tech_s_long_tail.html</a><br />
<span style="font-family: Verdana,sans-serif;">Becker, J. (2010, November 22). The official Netflix blog [Web log message]. Retrieved from <a href="http://blog.netflix.com/2010/11/new-plan-for-watching-instantly-plus.html">http://blog.netflix.com/2010/11/new-plan-for-watching-instantly-plus.html</a></span></span><span style="font-size: x-small;"> <br />
</span></div><div style="font-family: Verdana,sans-serif;"><span style="font-size: x-small;">Thornburg, D. (2008). Red Queens, butterflies, and strange attractors: Imperfect lenses into emergent technologies. Lake Barrington, IL: Thornburg Center for Space Exploration. </span><br />
<a href="http://www.tcse-k12.org/"><br />
</a></div>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com7tag:blogger.com,1999:blog-2870434950585132573.post-51329697980963087252011-01-16T08:27:00.000-08:002011-01-16T08:34:38.519-08:00The Disruptive Power of Second Life<div class="separator" style="clear: both; color: #134f5c; font-family: Verdana,sans-serif; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia1VILz4dpUQYMfYwdqP2jyRz_-DHPesJ5VGsgu0ph0_6N15KS6Yqw-2q-HDSDMCU0L-Ldq04DaSab1W8W4Uu1-CRelfHRnT9QZ1jMnNECVaJyT-DTCH27bDRBU38qFVV56xyfm3Oathsc/s1600/distruptiveTechnology.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia1VILz4dpUQYMfYwdqP2jyRz_-DHPesJ5VGsgu0ph0_6N15KS6Yqw-2q-HDSDMCU0L-Ldq04DaSab1W8W4Uu1-CRelfHRnT9QZ1jMnNECVaJyT-DTCH27bDRBU38qFVV56xyfm3Oathsc/s320/distruptiveTechnology.jpg" width="320" /></a></span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">Every time an attention-grabbing new technology emerges on the market, which has useful and fascinating features, it has an ability to modify pedagogy. These technologies not only change how instructional material is being conveyed, but they also affect how educational institutions do their business, in addition to impacting the curriculum and instructions. </span></div><div class="separator" style="clear: both; color: #134f5c; font-family: Verdana,sans-serif; text-align: left;"><span style="font-size: small;"><br />
</span></div><div class="separator" style="clear: both; color: #134f5c; font-family: Verdana,sans-serif; text-align: left;"><span style="font-size: small;">In the video, “Disruptive Technology,” Dr. Thornberg (n.d.) states that technologies sprout quickly and disrupt existing technologies. <a href="http://mitworld.mit.edu/video/108">Christensen</a> (2002) says that an opportunity is generated for innovators to create Disruptive Technology when they seize technological territory that the leaders of existing technologies don’t want. <a href="http://mitworld.mit.edu/video/108">Christensen</a> (2002) uses the example of mini-computers and how they became the disruptive technology; specifically, where Hewlett-Packard got disrupted by Sun, and Sun by Compaq, and Compaq by Dell. </span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">Christensen (2002) breaks down disruptive technology into two types: One that does not create a new market, but changes the product, and the second is a new technology that disrupts existing technology and pushes it out. Amazon Kindle is a good example of a disrupting technology that first took over the market of e-book readers, and popularized the e-readers. As bandwidth becomes more available, more applications are emerging. The price of Kindle DX Graphite (3rd Gen) reader is down which also is more affordable to target customers who could not afford it before. Furthermore, the product is better than its original 1st generation design which was released in 2007. </span></div><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="color: #134f5c; float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIU34RxT1XR5P9lggJvPWQzh16Ub0Jqeip882N7uvsyQF847Fx1VJ2MY9ccSRET9A_q1pI2vpR8onj34gxi3-BNvfEziMDjF-HmuozT5fS6xMNZwjqv0Z12i-yiseENLRptM9zHv0GZ3FM/s1600/secondlife_education.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIU34RxT1XR5P9lggJvPWQzh16Ub0Jqeip882N7uvsyQF847Fx1VJ2MY9ccSRET9A_q1pI2vpR8onj34gxi3-BNvfEziMDjF-HmuozT5fS6xMNZwjqv0Z12i-yiseENLRptM9zHv0GZ3FM/s320/secondlife_education.jpg" width="320" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><br />
</td></tr>
</tbody></table><h3 style="color: #134f5c; font-family: Verdana,sans-serif; font-weight: normal;"><span style="font-size: small;">Another example of disruptive technology that is also effects educational instructions and has social implications is The Second Life Education (<a href="http://wiki.secondlife.com/wiki/Second_Life_Education">http://wiki.secondlife.com/wiki/Second_Life_Education</a>).</span></h3><div style="color: #134f5c;"><span style="font-size: small;"></span><span style="font-family: Verdana,sans-serif; font-size: small; font-weight: normal;">There is a difference between the web and virtual worlds. When using virtual worlds, the users can create and incorporate Avatars that represents themselves as in real life, or they can create a character with a different identity. Furthermore, they can be a part of a group or create their own worlds. Rosedale (2008) compares the idea of Second Life to small transistors, which when they came out, created a new set of customers, specifically teenagers who could listen to music of their choice privately. <br />
<br />
Second Life has many registered users and many of them are learners. As a result, some businesses are taking advantage of this market and are trying to target younger customers. An example is an online company that teaches English which incorporates Second Life (</span><span style="color: blue; font-family: Verdana,sans-serif; font-size: small;"><a href="http://www.languagelab.com/"><span style="font-weight: normal; text-decoration: none;">http://www.languagelab.com/</span></a></span><span style="font-family: Verdana,sans-serif; font-size: small; font-weight: normal;">). These virtual world trends are incorporated by institutions, which incorporate lecture rooms and meeting halls. Scotland’s University uses Second Life </span><a href="http://edudirectory.secondlife.com/listing/show/listing_id/128" style="color: #0b5394;"><span style="font-family: Verdana,sans-serif; font-size: small;"><span style="font-weight: normal;">http://edudirectory.secondlife.com/listing/show/listing_id/128</span></span></a><span style="font-family: Verdana,sans-serif; font-size: small; font-weight: normal;"> to generate </span><span style="font-family: Verdana,sans-serif; font-size: small; font-weight: normal;">another way for learners to participate and generate learning. </span></div><h6 style="color: #134f5c; font-family: Verdana,sans-serif;"><div class="separator" style="clear: both; text-align: left;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Zu_PJGWcvd69MxD3cDHEWX-zimoCbyCNfndgyoOHdKipO375cgz4Rzf7PouNNjmzmeRcyKQW31Njyu2LjvAQRapSpT-rUx9Dg0RJdoIrR4ao8iFB8HS3xwkHMBbUZsdS2gm0Gqh9g6py/s1600/20110111avatar200.ashx.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Zu_PJGWcvd69MxD3cDHEWX-zimoCbyCNfndgyoOHdKipO375cgz4Rzf7PouNNjmzmeRcyKQW31Njyu2LjvAQRapSpT-rUx9Dg0RJdoIrR4ao8iFB8HS3xwkHMBbUZsdS2gm0Gqh9g6py/s1600/20110111avatar200.ashx.jpeg" /></a></span><span style="font-size: small;"><span style="font-weight: normal;">Since Second Life has decided to raise its prices for educators and has also closed its teen-only networks, a migration has started by educators from Second Life to OpenSims. <br />
<br />
<b>OpenSims is a disruptive</b></span><b> </b><span style="font-weight: normal;"><b>technology</b> which uses a previously created program called “Alice in Wonderland;” an open-source technology. It offers virtual environments similar to Second Life (</span><a href="http://thejournal.com/articles/2011/01/11/next-stop-open-sim.aspx" target="_blank"><span style="font-weight: normal;">http://thejournal.com/articles/2011/01/11/next-stop-open-sim.aspx</span></a><span style="font-weight: normal;">). “However, OpenSimulator is neither a clone of Second Life's server nor does it aim at becoming such a clone” (</span><a href="http://opensimulator.org/wiki/Main_Page" target="_blank"><span style="font-weight: normal;">http://opensimulator.org/wiki/Main_Page</span></a><span style="font-weight: normal;">).</span></span></div><span style="font-size: small;"><br />
</span></h6><h1 style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;"><span style="font-weight: normal;">These disrupting technologies are continuously transforming educational tools.</span></span></h1><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;"><br />
</span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">References:</span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">Christensen, C. (2002). <i>The innovation economy: How technology is transforming existing industries and creating new ones</i> [Video]. Retrieved from <a href="http://mitworld.mit.edu/video/108" target="_blank">http://mitworld.mit.edu/video/108</a>. <br />
</span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">Rosedale, P. (2008). <i>Second Life</i> [Video]. Retrieved from <a href="http://www.ted.com/index.php/talks/the_inspiration_of_second_life.html" target="_blank">http://www.ted.com/index.php/talks/the_inspiration_of_second_life.html<br />
</a></span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;">Linden Labs http://wiki.secondlife.com/wiki/Second_Life_Education</span></div><div class="MsoNormal" style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;"><span class="apple-style-span">Thornburg, D. (Producer). (nd).</span><span class="apple-converted-space"> </span><span class="apple-style-span">Disruptive Technology. [Video Podcast]. Laureate Education, Inc.</span></span></div><div style="color: #134f5c; font-family: Verdana,sans-serif;"><span style="font-size: small;"><br />
</span></div>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com7tag:blogger.com,1999:blog-2870434950585132573.post-86784479789100319612011-01-04T12:14:00.000-08:002011-01-10T05:54:34.401-08:00Rhymes of History<div style="font-family: Verdana,sans-serif;"></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6uZqAVDWTvdR5NXghvLvT7OafDb0zQms3XxpBKuIRJdbF4xOp63UC8RcrfXUVm7Mg4E-KQVNhx4khLEJqUxasRpFxis0W-NbKMbvf8HvC65T7bLyv6asfvTjYGC3sWlXbykEomQ9H_OLE/s1600/imagesjetson.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6uZqAVDWTvdR5NXghvLvT7OafDb0zQms3XxpBKuIRJdbF4xOp63UC8RcrfXUVm7Mg4E-KQVNhx4khLEJqUxasRpFxis0W-NbKMbvf8HvC65T7bLyv6asfvTjYGC3sWlXbykEomQ9H_OLE/s200/imagesjetson.jpg" width="200" /></a><i><span style="font-size: 12pt; font-style: normal;">Mark Twain says that history</span></i><span style="font-size: 12pt;"> doesn't repeat itself, but it does <i><span style="font-style: normal;">rhyme</span></i><i>.</i> <br />
<br />
</span><span style="font-size: 12pt;">Dr. Thornburg similarly describes one of the forces that drive emerging technology as “Rhymes of history,” which is a term he uses to define new technology which has emerged due to the impact felt many years before from another technology, or when a technology rekindles something from the past. <br />
</span> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: 12pt;">In <a href="http://www.ted.com/speakers/kevin_kelly.html" style="color: blue;">Kevin Kelly</a>’s speech, "<a href="http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html" style="color: blue;">The Next 5,000 Days of the Web</a>," he discusses the impact the web has on society and states that: “We will increasingly be dependent on the Internet and it will increasingly be dependent on us.” We already depend on many technological aspects of the Internet, such as using different mobile technologies, connecting with each other, and even communication with banks, schools, and government offices. We use the cloud computing to store, retrieve, and transmit data, in addition to communicating; and new technologies are continuously emerging. <br />
<br />
</span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzGGF1Gbl0z_-E6WAT6wxyFQPa1U4zlvvQCTGVHJ9o_4lOpCnrCUjNHYJ8xXk2eXtsHPhIR5KugL31xeP5zatO9W2uxWhV4FqWUYPkDzhTlLNLteVdtlRjDbGNV-NrcDF1blh-uxpsb71w/s1600/Go-James-Bond-with-the-ThinkGeek-SpyNet-Mission-Video-Watch-2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzGGF1Gbl0z_-E6WAT6wxyFQPa1U4zlvvQCTGVHJ9o_4lOpCnrCUjNHYJ8xXk2eXtsHPhIR5KugL31xeP5zatO9W2uxWhV4FqWUYPkDzhTlLNLteVdtlRjDbGNV-NrcDF1blh-uxpsb71w/s1600/Go-James-Bond-with-the-ThinkGeek-SpyNet-Mission-Video-Watch-2.jpg" /></a><span style="font-size: 12pt;">In tune with Kelly’s concepts of embodiment, restructuring, and codependency, we can look at the development of Skype as part of a “rhymes of history.” Video phones have always been a part of collective imagination which can be seen from their use in the Jetson cartoons, and the James </span><span style="font-size: 12pt;">Bond and Star Trek movies. In earlier times, drawings of future princes and princesses were carried by messengers to arrange marriages around continents; we always wanted to see the person with whom we are communicating. From the idea of the <a href="http://en.wikipedia.org/wiki/Telectroscope">Telephonoscope</a>, came personal video phones and Skype, where users can transmit live images. Videophones were mostly developed due to broadband Internet technology. As cloud technology advances, Kelly states that the Internet will become more personalized, where we will all have a global profile that will be our identification on the Internet, which means that we and others could connect and “see” us. </span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><br />
</div><div class="separator" style="clear: both; font-family: Verdana,sans-serif; text-align: left;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0BgtYypSbqUpa1YnZOahmYaNCJMncR4DqVMY7TQtzPZduo5XqJbBaEI62TLogJbbnz-Cpe2JRtxCIkZoFMUdeDjAmByeoUOefsIWG3UvK1moH3qMGeytrXNEMvTpq44O01dxd6Rp_cN7/s1600/videophone.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="183" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0BgtYypSbqUpa1YnZOahmYaNCJMncR4DqVMY7TQtzPZduo5XqJbBaEI62TLogJbbnz-Cpe2JRtxCIkZoFMUdeDjAmByeoUOefsIWG3UvK1moH3qMGeytrXNEMvTpq44O01dxd6Rp_cN7/s200/videophone.png" width="200" /></a></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL2ytlMBueQFUXE1FOXA_51sJcyH5da6_0fYjL9OP4RlOB9E3MyTVOPAzNbXo7akxVVs2FvZuM5IGwKIfz1n2J0nldVGE1520YPbarc5W8W__exmbex-ZTXWwA-QCaBKACYYwmEaSc_9Ci/s1600/t1larg_skype_tv_gi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL2ytlMBueQFUXE1FOXA_51sJcyH5da6_0fYjL9OP4RlOB9E3MyTVOPAzNbXo7akxVVs2FvZuM5IGwKIfz1n2J0nldVGE1520YPbarc5W8W__exmbex-ZTXWwA-QCaBKACYYwmEaSc_9Ci/s200/t1larg_skype_tv_gi.jpg" width="200" /></a><span style="color: black; font-size: 12pt;"> <span lang="EN"> </span></span><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<span style="color: black; font-size: 12pt;"><span lang="EN">CNN Tech </span></span><span lang="EN" style="font-size: 12pt;">(March 2, 2010)</span><span lang="EN" style="color: #666666; font-size: 7.5pt;"> </span><span lang="EN" style="color: black; font-size: 12pt;">ran an interesting article on high-speed Internet, television and Skype and whether it could be combined to create a videophone TV: “Skype on TV: Will the videophone finally be reality?” (<a href="http://www.cnn.com/2010/TECH/03/02/skype.on.tv.videophone/index.html" style="color: blue;" target="_blank">http://www.cnn.com/2010/TECH/<wbr></wbr>03/02/skype.on.tv.videophone/<wbr></wbr>index.html</a>)<br />
<br />
</span><span style="font-size: 12pt;">The latest article on CNN Tech (January 4, 2011) “</span><span lang="EN" style="font-size: 12pt;">5 gadget trends to watch at CES” (Consumer Electronics Show) showcase technological tools whose meteoric technological advances were possible due to the development of the Internet and cloud computing.</span><span lang="EN" style="color: black;"> </span><span lang="EN" style="color: black; font-size: 12pt;"> <a href="http://www.cnn.com/2011/TECH/gaming.gadgets/01/04/ces.expected.trends/index.html?hpt=C2" target="_blank"><span style="color: blue;">http://www.cnn.com/2011/TECH/</span><wbr style="color: blue;"></wbr><span style="color: blue;">gaming.gadgets/01/04/ces.</span><wbr style="color: blue;"></wbr><span style="color: blue;">expected.trends/index.html?</span><wbr style="color: blue;"></wbr><span style="color: blue;">hpt=C2</span><br />
<span style="font-size: small;"><br />
</span></a></span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: small;">Reference:</span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: small;"><a href="http://ezp.waldenulibrary.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=37193198&site=ehost-live&scope=site" target="_blank"><span style="color: black; text-decoration: none;">Friedman, N. (2009). The high cost of computers? U.S. Naval Institute Proceedings, 135(3), 90−91.</span></a><br />
<br />
Kelly, K. (2007, December). The next 5,000 days of the web [speech]. Speech delivered at the EG 2007 Conference, Los Angeles. Retrieved from <a href="http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html" target="_blank"><span style="color: black;">http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html</span></a></span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: small;"><span style="color: #333333; letter-spacing: 1.5pt;"><br />
<span style="color: black;">Pew Internet & American Life Project. (2010, June 11). </span><i style="color: black;">The future of cloud computing</i><span style="color: black;">. Retrieved from http://pewresearch.org/pubs/1623/future-cloud-computing-technology-experts</span></span></span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: small;"><br />
Thornburg, D. (Producer). (nd). Rhymes of history. [Video Podcast]. Laureate Education, Inc.</span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="font-size: small;"><br />
Thornburg, D. (Producer). (nd). Six forces that drive emerging technology. [Video Podcast]. Laureate Education, Inc.</span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><span style="background-color: #073763;"></span><br />
<span style="font-size: 12pt;"></span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif;"><a href="file:///C:/DOCUME%7E1/ohirsh/LOCALS%7E1/Temp/msohtmlclip1/01/clip_image002.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br />
</a></div>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com8tag:blogger.com,1999:blog-2870434950585132573.post-69780522621809075662010-12-22T05:03:00.000-08:002010-12-23T08:28:22.814-08:00Module 2 - Emerging Technologies Tetrad<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkxRAedFtQ4U5gu3dHmLZY2G657VIvdExKQMwU3iOLG1s8tC-yC7Ki3rGfGgjY_Zw2GT9e1Kp0MuC-PG_ODZ7lerOo89hV2L8ELYd88YtMeylY1PRX16KOGLqfhAi4hv2H84MTQ2ptbiQQ/s1600/tetrad2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"> </a></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
</span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkxRAedFtQ4U5gu3dHmLZY2G657VIvdExKQMwU3iOLG1s8tC-yC7Ki3rGfGgjY_Zw2GT9e1Kp0MuC-PG_ODZ7lerOo89hV2L8ELYd88YtMeylY1PRX16KOGLqfhAi4hv2H84MTQ2ptbiQQ/s1600/tetrad2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkxRAedFtQ4U5gu3dHmLZY2G657VIvdExKQMwU3iOLG1s8tC-yC7Ki3rGfGgjY_Zw2GT9e1Kp0MuC-PG_ODZ7lerOo89hV2L8ELYd88YtMeylY1PRX16KOGLqfhAi4hv2H84MTQ2ptbiQQ/s320/tetrad2.jpg" width="320" /></a></div><br />
<div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">If few years ago, blogs were only viewed as a journal on a cloud, now they are offering the option of rich site summary (RSS) feeds where readers can receive immediate feedback if there is a new post. However, blog features are still carrying over many technical features of an email. As cloud computing continues to expand, many features of blogging will start to change as well in order to accommodate new users. </span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">An article in the <i>New York Times<span style="color: red;"> </span></i> E-Mail Gets an Instant Makeover (<a href="http://www.nytimes.com/2010/12/21/technology/21email.html?_r=2">http://www.nytimes.com/2010/12/21/technology/21email.html?_r=2</a> ) states that teenagers are preferring a faster <span style="color: black;">and immediate response </span>to their messages<span style="color: black;">, which is lacking on Blogs. </span></span><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:DontVertAlignCellWithSp/> <w:DontBreakConstrainedForcedTables/> <w:DontVertAlignInTxbx/> <w:Word11KerningPairs/> <w:CachedColBalance/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style> <![endif]--><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Therefore, I think Twitter is the cluster and chain to Blogs and WordPress, where users can post “on the go,” although, they can only post up to 140 characters. The chain is formed because the Twitters might eventually completely replace Blogs in the near future and it does bring to mind journal writing. As a cluster, Twitter shares the same laws with Blogs.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"> </span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Reference:</span></div><div class="MsoNormal">Elon University/Pew Internet Project. (n.d.). <i>Imagining the Internet: A history and forecast: Back 150 timeline</i>. Retrieved July 22, 2009, from <a href="http://www.elon.edu/e-web/predictions/back150years.pdf" target="_blank">http://www.elon.edu/e-web/predictions/back150years.pdf</a><br />
<span style="font-family: "Times New Roman","serif"; font-size: 12pt;"> </span></div><div class="MsoNormal"><br />
<br />
<div class="MsoNormal" style="font-family: Times,"Times New Roman",serif;"><span style="color: #333333; font-size: 9pt; letter-spacing: 1.5pt;">Pew Internet & American Life Project. (2010, June 11). <i>The future of cloud computing</i>. Retrieved from http://pewresearch.org/pubs/1623/future-cloud-computing-technology-experts</span></div><br />
Thornburg, D. D. (2008b). <i><a href="http://sylvan.live.ecollege.com/ec/courses/14936/CRS-WUEDUC8812-3730077/emerging_technologies_and_mcluhan%27s_laws_of_media.pdf" target="_blank">Emerging technologies and McLuhan's Laws of Media</a></i>. Lake Barrington, IL: Thornburg Center for Space Exploration.<span style="font-family: "Times New Roman","serif"; font-size: 12pt;"> </span></div>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com7tag:blogger.com,1999:blog-2870434950585132573.post-72480490255748900302010-12-14T11:35:00.000-08:002010-12-19T11:02:31.181-08:00Emerging and Future Technologies<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnjGH7NZwuJ7xWs_Y8-yBbCA9VwUe0eB5Kv-oiR4VhJ8BkMKiYuTjX5xggX9Rmg7mNo3ZEtPbCuH38pkj636lxPaSAKZvXQXYLLtCS46IdH4nfOTAtH5ef7bh8guXimZbIJssh6tTeYdoM/s1600/cloud.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnjGH7NZwuJ7xWs_Y8-yBbCA9VwUe0eB5Kv-oiR4VhJ8BkMKiYuTjX5xggX9Rmg7mNo3ZEtPbCuH38pkj636lxPaSAKZvXQXYLLtCS46IdH4nfOTAtH5ef7bh8guXimZbIJssh6tTeYdoM/s1600/cloud.jpg" /></a></div><div style="color: #0b5394;"><b><span dir="ltr" id=":10h">SITTING</span></b><b> ON A CLOUD </b></div>In the last few years, the idea of cloud computing has taken over individuals and organizations. <br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY1vP07QYSo_02MmxObifD-EKvybomauXTen8RS6IYk6uFsC7jb6fR6c38vLTVAEDrAXfKLERfiL1CH6n4tPAz9nmgZa5g6K3GcRCV3RgbfurJZLsNDLSPDsrBA-4e-qFLmcA1BE1iGOUQ/s1600/externaldrive.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="188" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY1vP07QYSo_02MmxObifD-EKvybomauXTen8RS6IYk6uFsC7jb6fR6c38vLTVAEDrAXfKLERfiL1CH6n4tPAz9nmgZa5g6K3GcRCV3RgbfurJZLsNDLSPDsrBA-4e-qFLmcA1BE1iGOUQ/s200/externaldrive.jpg" width="200" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"></td></tr>
</tbody></table>The way we save and backup our files is changing which is opening new doors to collaboration among professionals, students, and organizations. Our storage media has evolved from floppy disks, CDs, flash drives, external hard drives and other storage devices. With the cloud, there is no need to carry all of the files with the threat of the loss of a storage media which translates into lost work. Now, it all “sits” on a cloud in a centralized location which can easily be retrieved with an Internet connection. Cloud computing not only changes how we store and retrieve applications and files, but also how we communicate and share them with other members of our group, and how organizations restructure and modernize their IT infrastructure. An example is <a href="http://dropbox.com/">Dropbox.com</a>, a free option to save files on the cloud and which also allows users to share particular files with others. <br />
Furthermore, according to a report by Gartner: “By 2016, all Global 2000 companies will use public cloud services” (<a href="http://www.gartner.com/it/page.jsp?id=1465614">http://www.gartner.com/it/page.jsp?id=1465614</a>). In cloud computing, there is also a cost advantage for organizations and for individual use. It is more cost effective to use cloud services than purchasing and maintaining additional computer processors and constructing large data centers on college campuses. Using the cloud helps with regards to short and long term projects that demand additional computer requirements and software applications. Also, learners do not have to rely on computer labs and to purchase expensive applications for particular classes, but instead, users have access on-demand to data. <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRedNBIaziHhWiHltgxEbm7bWjLZiHp1Mq53y-0nTexqN9EMjPR8TbDj4pVSb8dYoncgqKw3KFNpZHToSdM_jk0nI5H0dMMv7grjhmnecH8GFrQzcZxWFyicDc2wWLXe5ZH-4d9hMWwgN5/s1600/cloudcomputing_200x150.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRedNBIaziHhWiHltgxEbm7bWjLZiHp1Mq53y-0nTexqN9EMjPR8TbDj4pVSb8dYoncgqKw3KFNpZHToSdM_jk0nI5H0dMMv7grjhmnecH8GFrQzcZxWFyicDc2wWLXe5ZH-4d9hMWwgN5/s200/cloudcomputing_200x150.jpg" width="200" /></a>Furthermore, cloud computing creates a real opportunity for collaboration among learners and administration within a classroom, campus, or even globally without any delay where they can share ideas, work on projects, and research in addition to minimizing additional operation costs. <br />
However, one of the main concerns of using cloud computing is the security of the data and the continuation of the services. There are always cyber attacks occurring and it is important for the users to be aware of all the pitfalls of cloud computing. However, there is an increased danger of misplacing and losing USB drives which is more common, rather than incurring a cyber attack! Another issue is if there is no Internet connection, you cannot retrieve your document, although cell phones are creating another way to go around that problem. <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd-kp4pNBebzNH-65KI4M69gNPrPiLHeLRnB1nmGwX8qOXejzlW22DStoWrvxm4TcxM3ZW2YacE5GHxV8aFz1CL-ERt-jihquFC_UFA5NDf0gdXOR9kGQYP39o49Wu5EMPux1M0jxcNhhK/s1600/hr.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd-kp4pNBebzNH-65KI4M69gNPrPiLHeLRnB1nmGwX8qOXejzlW22DStoWrvxm4TcxM3ZW2YacE5GHxV8aFz1CL-ERt-jihquFC_UFA5NDf0gdXOR9kGQYP39o49Wu5EMPux1M0jxcNhhK/s200/hr.jpg" width="186" /></a><br />
The use of cloud computing in education should eliminate students’ need to carry homework assignment and projects on USB drives or in the form of papers. Educators will have the option to view students’ assignments online and post their assignments there as well. This will also help parents to have a better handle of what is covered in class and the students’ progress.<br />
<br />
In order for the saving and retrieving of files from the cloud to be successful, educators have to be active participants in it! Rogers (2003) states that how the emerging idea is communicated can affect the rate of adaptation of the new technology (p.222); meaning, if the idea comes from the organization itself, this factor can influence its acceptance by the parties (p.356). According to Gardner 2010 forecast report of strategic planning assumptions (<a href="http://www.1105info.com/t.do?id=6589564:17617519">http://www.1105info.com/t.do?id=6589564:17617519</a>): “by 2013, 75% of higher education institutions will incorporate social software in distance learning.” In this case, educators will be less hesitant to implement new technology, especially because there would be no need to purchase additional technology by the schools.<br />
Therefore, I believe that social network integration in the classrooms will increase over time. <a href="http://www.dropbox.com/">http://www.dropbox.com/</a> and other similar options of a cloud computing, where learners can save their information on a cloud and share files with peers and educators, will be incorporated as part of a class curriculum and will help eliminate the carrying of school work in terms of paper and external files for students. <br />
The question is what would make this technology even better. It can improve only if it will be used in education, as new ideas are generated by educators, it will continue to improve the product. <br />
<br />
Reference: <br />
Rogers, E. (2003). Diffusion of innovations. New York: Free Press.<br />
<br />
Thornburg, D. (2009). Current trends in educational technology. Retrieved from <a href="http://sylvan.live.ecollege.com/ec/Courses/14936/crs-wueduc8812-3526271/when_is_a_technology_emergent.pdf">http://sylvan.live.ecollege.com/ec/Courses/14936/crs-wueduc8812-3526271/when_is_a_technology_emergent.pdf<br />
<br />
</a><br />
<a href="http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterlyMagazineVolum/CollaborationinHigherEducation/199373">http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterlyMagazineVolum/CollaborationinHigherEducation/199373</a><br />
<br />
http://www.educause.edu/EDUCAUSE%2BQuarterly/EDUCAUSEQuarterlyMagazineVolum/CloudComputing/213724Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com8tag:blogger.com,1999:blog-2870434950585132573.post-67238719579949143602010-01-31T07:49:00.000-08:002010-01-31T09:55:10.070-08:00Keller's ARCS ModelWe all want new technological tools to be used to enhance productivity and promote creativity at work and school. However, the tools themselves cannot do the job; students, employees, pedagogues have to be motivated to use these tools properly. Motivation is a main aspect to achieving a successful outcome at school and or work. The best teaching methods will not succeed if the student is not motivated to learn, but if his only goal is to pass the test, and at work, the unmotivated employee will only do the job required without putting any additional thought into projects. <br />Keller’s ARCS model points out important points such as the need to grab a student’s attention, to develop relevance to matters with which the student is familiar, to help students build confidence through encouragement and setting attainable goals during the learning process. Moreover, satisfaction is achieved through positive feedback and rewards for students and employees.<br />An example is my class where students are currently working through the service learning program on developing a website for one of the local chapters for the TSA organization. To achieve the desired outcome, students have to be wholly motivated and understand the importance of the project. Following Keller's ARCS Model helps in generating interest by the students which inspires motivation. For attention, curiosity was stimulated toward the project. Students work collaboratively and build on each other's strengths. Moreover, through brainstorming and generating ideas, their confidence in their abilities grow. Students understand the relevance of the project to their professional development. The project is relevant because the students build on their previous knowledge, use creativity, learn through researching and developing new skills which they share in their groups and outside their group with other class members. As the semester is coming to conclusion, so is the project. The confidence has been developed in the students through the project because they controlled the process and the final outcome is result of their work. I know that students are motivated, because at the end of the each class, they continue to work and do not run out.<br /><br />Reference: <br />Driscoll, M. P. (2005). Psychology of learning for instruction (3rd ed.). Boston: Pearson Education, Inc.<br />Keller, J. M. (2006, June 20). Motivation Design. Retrieved January 26, 2010, from : http://www.arcsmodel.com/home.htmOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com3tag:blogger.com,1999:blog-2870434950585132573.post-48804682842093938952010-01-24T15:19:00.000-08:002010-01-25T08:12:06.213-08:00Connectivism<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5idrzM_Wa0l3kRnbno5KvZ7W6UlTvAQ1M38hCZLB0aJDEVe5H1OWaRME7CxRkIWfyCvTGbfDhSxsJ0QJ340gZnW9pNzEOTvxeNzLPNAPWTsobKGkgh-KbC8dRoHk9eFawhkZo2id7Sksf/s1600-h/mind_map_Hirsh_Orit.jpg"><img style="cursor:pointer; cursor:hand;width: 400px; height: 198px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5idrzM_Wa0l3kRnbno5KvZ7W6UlTvAQ1M38hCZLB0aJDEVe5H1OWaRME7CxRkIWfyCvTGbfDhSxsJ0QJ340gZnW9pNzEOTvxeNzLPNAPWTsobKGkgh-KbC8dRoHk9eFawhkZo2id7Sksf/s400/mind_map_Hirsh_Orit.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5430450520916481858" /></a><br /><br />Through the use of social networks, my learning is not limited to one location or one group of people. Due to social networks, my circle from where my knowledge is generated has expanded. I learn not only from my close circle of co-workers or friends, but also from people I have never met, but with whom I share a common professional interest. We exchange knowledge through listserv or through other social networks such as YouTube and blogs. The exchange of innovative thinking is made easier through social networks since new ideas can be easily debated and discussed without any particular limitations or boundaries such as time and location.<br />Their is no one particular tool which has facilitated learning more than any other as I find the web to be is a vast resource of information. There are several options as to where to find immediate answers or to look for information as to where the best answers are. The first is to post the question on one of the social networks where there is an interest of the same topic and usually an instantaneous response will be generated. Another option is to use Open University such as <a href="http://oyc.yale.edu/">http://oyc.yale.edu/</a>; I don’t have to be enrolled in a particular class to listen to a lecture if I have a particular interest on a topic and wish to expand my knowledge.<br /><br /><a href="http://hosted4.mediasite.com/mediasite/Catalog/?cid=cd40888eed5940f2bbd8daa8c09b4ecc">Educause Learning Initiative Annual Meeting 2008</a>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com1tag:blogger.com,1999:blog-2870434950585132573.post-82422351719290585792010-01-05T08:24:00.000-08:002010-01-06T10:04:10.386-08:00CollaborationDo you believe that humans have a basic instinct to “interact and work as a group,” as Rheingold proposed in his discussion of the evolution of Wikipedia as a collectively developed encyclopedia? How can technology facilitate collaboration among learners based on constructivist principles? <br /><br />I believe that as humans we have a basic instinct to “interact and work as a group.” There are many examples throughout history, especially in the development of technological tools. A recent example is the development of <a href="https://www.google.com/accounts/ServiceLogin?service=wave&passive=true&nui=1&continue=https%3A%2F%2Fwave.google.com%2Fwave%2F&followup=https%3A%2F%2Fwave.google.com%2Fwave%2F<mpl=standard">Google's new “Wave” </a>tool. Developed by group of people at Google, it encompasses the instantaneous of an Instant message chat and an email and can work as a motivating collaborative tool. Most computer games and softwares have all been developed by a combined effort of a group utilizing individual skills. We even create study groups in college to facilitate learning. <br />In his speech on collaboration, <a href="http://www.ted.com/index.php/talks/howard_rheingold_on_collaboration.html">Howard Rheingold</a> emphasizes important points, his first presumed cliché statement is that we “succeed by destroying and dominating competition.” However, he continues saying that we also succeed through collaborative effort and when we all work in concert. For example, large corporations merge for the purpose to extend and produce better products, rather than working against each other because it is in their mutual self interest. Another good example introduced by Rheingold is the Open Source products, such as Linux, Mozilla, Apache, Wikipedia, and the free Open University lectures posted by Berkley University and Yale. These free available resources are popular because they are good products in view of the fact that each programmer contributes his knowledge continuously improving these products. <br />Technology plays an important factor in education and <a href="http://en.wikipedia.org/wiki/Web_2.0">Web2.0</a>, and especially accolade constructivist principles. With Web1.0, the information was only communicated through technology to the public, with Web 2.0 it has became a discourse through the use of social networks. Web2.0 encourages dialog with teachers and with peers, asks questions and nurture a learner’s curiosity. Through the use of technology, it is important to let students analyze, create, classify and accept a learner’s independence and initiative. <br /><br />Reference:<br /><a href="http://www.ted.com/index.php/talks/howard_rheingold_on_collaboration.html">http://www.ted.com/index.php/talks/howard_rheingold_on_collaboration.html</a>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com4tag:blogger.com,1999:blog-2870434950585132573.post-48773656720059474152009-12-23T08:19:00.000-08:002009-12-23T08:20:50.547-08:00Cognitivism as a Learning TheoryBill Kerr questions learning theories on his Blog, and especially asks how can we choose from all of the learning theories? We should cherry-pick different useful ideas out of the various theories according to what and who we are educating. Theories do evolve and interlace; the behaviorist aspects can even be observed through games associated with cognitive and constructivist theories. A game’s intent depends on understanding the motivation verses the reaction behavior of the player. An example is a player’s decisions in the game which are proportional to the rewards gained. Games teach behavior by reinforcing positive rewards. George Siemens underlines this on his website: “Constructivism suggests that learners create knowledge as they attempt to understand their experiences (Driscoll, 2000, p. 376). Behaviorism and cognitivism view knowledge as external to the learner and the learning process as the act of internalizing knowledge.”<br />My goal is to enhance knowledge through understanding and interest rather than pure memorization. I would like my students to be able to learn how to construct knowledge independently and be able to place it in context. To achieve this goal, I evaluate the outcomes through assessing the learning progression of the students and by evaluating the students’ interest through their engagement in the class. Some projects are done individually and some are done as part of a collaborative effort to simulate the working environment outside of the classroom. I provide the guidance on how to use and assess the needed tools and take on the role of an adviser and guide for the students to achieve the optimum results. Since each student comes to the class with a varied knowledge base, through individualized and collaborative projects, they construct and enhance individual knowledge skills. <br />The information technology age and especially the advancement of mobile devices have changed the working environment. Neither the employee nor the students are confined to a particular location or time to work or study. Due to the ubiquitous and mobile nature of technology, work and school have become “anytime and everywhere.” With that, the expectations of the employee have changed. The employee is required to have cognitive skills, be problem solvers and able to work in a collaborative and dynamic communication driven environment. Therefore, Karl Kapp is correct to state on his blog: “We need to take pieces from each school of thought and apply it effectively.”<br /><br />Reference:<br />Driscoll, M. P. (2005). Psychology of learning for instruction (3rd ed.). Boston: Pearson Education, Inc.<br /><br />Kapp, K. (2007, January 2). Out and About: Discussion on Educational Schools of Thought. Retrieved December 23, 2009, from : http://karlkapp.blogspot.com/2007/01/out-and-about-discussion-on-educational.html<br /><br />Kerr, B. (2007, January 1). Retrieved December 23, 2009, from : http://billkerr2.blogspot.com/2007/01/isms-as-filter-not-blinker.html<br /><br />Siemens, G. (2004, December 12). A Learning Theory for the Digital Age. Retrieved December 23, 2009, from : http://www.elearnspace.org/Articles/connectivism.htmOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com4tag:blogger.com,1999:blog-2870434950585132573.post-67004007145311686282009-12-14T15:00:00.000-08:002009-12-14T15:01:46.462-08:00Learning Theory and Educational TechnologyCritique Siemens’s “metaphors of educators.” Which of these metaphors best describes the role you believe an instructor should take in a digital classroom or workplace? Is there a better metaphor to reflect your view of the role of instructors? <br /><br />As I read Siemens (2008) “metaphors of educators,” the metaphor that especially grabbed my attention was “educator as curator” and “educator concierge,” by Curtis Bong. The reason is because although the information on the web is available online, it is fragmented, unlike a textbook where the information is collected in an organized manner. In online education, an instructor can bring together resources for the student in order to have an effective learning and teaching environment. The resources can be posted in a class “library” as a suggestion. It is the instructor’s responsibility to be present as an expert or a “curator” who presents a “map” by providing clear instructions and enhancing the education of the student by navigating the student to new resources or learning devises that the student might not be aware of (p.16). In order to do so, an effective instructor has to create opportunities for the learner to express his standpoint in a more engaging form, thereby allowing him to reflect on the reading and to emphasize his point-of-view. I compare Siemens’ (2008) metaphor to my own instructions in the classroom. At the end of the eBusiness Technology class, students have to create a fictitious eBusiness. Throughout the semester, I provide them with tools in-class and online, but the students are the ones who generate new ideas and approaches and thus build upon acquired knowledge. When a student is an active participant, I believe there is also a better understanding of a subject. <br /><br /><br />References<br />Siemens, G. (2008, January 27). Learning and Knowing in Networks: Changing roles for Educators and Designers. Retrieved December 7, 2009, from Presented to ITFORUM for Discussion: http://it.coe.uga.edu/itforum/Paper105/Siemens.pdfOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com6tag:blogger.com,1999:blog-2870434950585132573.post-22451047279668904662009-11-14T16:07:00.000-08:002009-11-17T13:40:59.808-08:00Cyber-Language in Education<a href="http://www.youtube.com/watch?v=opwv_eY050M">Final Video Project Posted on YouTube</a><br /><br /><br />Annotated Bibliography<br />Baron, N. (2005). Instant Messaging and the Future of Language. Communications of the ACM, 48(7), 29-31. Retrieved from Academic Search Complete database.<br />In collaboration with her students, Baron (2005) conducted exploratory research at the American University in Washington D.C on the use of Instant Messages (IM) by students which spans over three years. The purpose of the research is to explore the question whether computer-mediated-communication (CMC) degrades the language. Baron states that viewing CMC as either good or bad is twofold. Online communication reflects on gender, age, educational level, cultural background, personality and experience with CMC platforms or the purpose of use. Furthermore, Baron writes that adolescents have long been a source of linguistic and behavioral novelty. They often use language to express group identity. However, Baron’s research concludes that the use of IMs is unlike to play a role in altering writing standards unless parents and educators allow it to happen. <br /> <br />Derk, D., Bos, A., & von Grumbkow, J. (2008). Emoticons in Computer-Mediated Communication: Social Motives and Social Context. CyberPsychology & Behavior, 11(1), 99-101. doi:10.1089/cpb.2007.9926.<br />The study examined the social motives for emoticon use and other aspects that might influence emoticon use in computer-mediated-communication (CMC). The participants were subscribers of Psychology Magazine Web site in the Netherlands. This group consisted of 789 women and 136 men for a total 925 participants who filled out the questions handling the background variables. The questionnaire focused on motives for emoticon use. The emoticons used were big smile, smile, sad, wink, confused, and cry. Through statistical analyses, the study demonstrates that people use more emoticons in communicating with friends than in communicating with strangers. Furthermore, more emoticons are used in positive contexts than in negative contexts. Emoticons are mostly used for the expression of emotion, for strengthening the verbal part of a message, and for expressing humor. These purposes correlate with the functions of nonverbal emotional expression in face-to-face communication. The study only concentrated on the senders’ perspective and not the receiver. <br /><br />Fox, A., Rosen, J., & Crawford, M. (2009). Distractions, Distractions: Does Instant Messaging Affect College Students' Performance on a Concurrent Reading Comprehension Task? CyberPsychology & Behavior, 12(1), 51-53. doi:10.1089/cpb.2008.0107.<br /> The research purpose is to investigate whether the use of Instant Messages (IM) affects cognition in student’s performances when used simultaneously while studying. The study sprouts from other qualitative studies which investigated the effects of media on cognition during study and work time. Sixty-nine undergraduate students participated for course credit in an introductory psychology course using AOL Instant Messenger (AIM). Researchers tested their reading comprehension in order to test recognition memory and a survey of computer and web use and attitudes were also evaluated. Overall, the authors concluded that their results were inconsistent with prior research indicating: “that interaction negatively affects task performance;” however IM usage did affect negatively performances on reading comprehension.<br /><br />Lee, C. (2007). Affordances and Text-Making Practices in Online Instant Messaging. Written Communication, 24(3), 223-249. doi:10.1177/0741088307303215. <br />The purpose of the qualitative study conducted by Lee (2007) is to examine the factors that influence “text-making practices” in IM within a social theory of literacy. In addition, the study seeks to understand the changing nature of practices through analyzing IM texts and people’s perceptions associated with these texts. The data was collected over a 2-year period and is based on a study that examines the everyday uses of IM by conducting qualitative and semi-structured interviews, including observations, logbook keeping, face-to-face and online interviews. The sample group consisted of 19 participants, all located in Hong Kong, who shared similar linguistic backgrounds and were aged 20-28 years. Lee’s (2007) study concluded that the participants’ familiarity with their linguistic resources and typing speed justified their choice of language use in IM (English or Cantonese). Moreover, Lee (2007) states that environmental factors impact people’s decision what to do and how to act within an IM. <br /><br />Lo, S. (2008). The Nonverbal Communication Functions of Emoticons in Computer-Mediated Communication. CyberPsychology & Behavior, 11(5), 595-597. doi:10.1089/cpb.2007.0132. <br />Lo’s (2008) research examined the use of emoticons as a communication tool in computer-mediated communication (CMC) where nonverbal cues are lacking. The purpose of the study was to verify whether emoticons possess nonverbal cue functions based on the definitions of nonverbal communication (emotion, attitude, and attention). The methodology used simulated three scenarios and evaluated 137 instant message service (IMS) users who were randomly assigned into one of three scenarios. The experiment adopted a widely uses IMS software as a background. Lo’s (2008) research concludes that without emoticons, most people cannot recognize correct emotions, attitude, or intent as they are lacking the visual cues in CMC. These results prove that emoticons perform nonverbal communication functions.<br /><br />Maness, J. (2008). A Linguistic Analysis of Chat Reference Conversations with 18-24 Year-Old College Students. Journal of Academic Librarianship, 34(1), 31-38. Retrieved from Academic Search Complete database. <br />Maness’ (2008) research analyzed and compared Instant Messaging (IM) conversations held among students and among students talking to librarians using IM. The data was collected from two sources. The first source relied on the research done by Baron in 2004 that reported the findings of a study of 23 undergraduate students’ IM conversations at American University. The second source was chat reference conversations provided by AskColorado, a state-wide multi-type library collaborative service administered through the Colorado State Library using a survey and by a study. It analyzed 31 chat reference conversations by tabulating the number of words written by patron and librarians. Maness (2008) concluded that the chat reference conversation is more formal than the student-to student IM conversation. It appears that the librarians were writing, but the patrons were “speaking.” However, Maness (2008) concludes that the use of emoticons, abbreviations, acronyms, and other nonverbal compensations was infrequent when used with librarians and that student’s linguistic style changes according to the social setting. <br /><br />References<br />Baron, N. (2005). Instant Messaging and the Future of Language. Communications of the ACM, 48(7), 29-31. <br /><br />Crystal, D. (2001). Language and the Internet. Cambridge: Cambridge U P. <br /><br />Derk, D., Bos, A., & von Grumbkow, J. (2008). Emoticons in Computer-Mediated Communication: Social Motives and Social Context. CyberPsychology & Behavior, 11(1), 99-101. doi:10.1089/cpb.2007.9926.<br /><br />Fox, A., Rosen, J., & Crawford, M. (2009). Distractions, Distractions: Does Instant Messaging Affect College Students' Performance on a Concurrent Reading Comprehension Task?. CyberPsychology & Behavior, 12(1), 51-53. doi:10.1089/cpb.2008.0107.<br /><br />Lee, C. (2007). Affordances and Text-Making Practices in Online Instant Messaging. Written Communication, 24(3), 223-249. doi:10.1177/0741088307303215. <br /><br />Lo, S. (2008). The Nonverbal Communication Functions of Emoticons in Computer-Mediated Communication. CyberPsychology & Behavior, 11(5), 595-597. doi:10.1089/cpb.2007.0132.<br /><br />Maness, J. (2008). A Linguistic Analysis of Chat Reference Conversations with 18-24 Year-Old College Students. Journal of Academic Librarianship, 34(1), 31-38. Retrieved from Academic Search Complete database.Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com6tag:blogger.com,1999:blog-2870434950585132573.post-71071632050039221682009-11-05T11:19:00.000-08:002009-11-06T07:43:00.320-08:00Mind Map: Static versus Dynamic Technologies<a href="http://educ8842oh.wikispaces.com/Mind+Map+Static+Versus+Dynamic+Technologies"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm8O8rz2tuhArC3YECFgzPa9fwI0TnDcSGxIB9I-vVn6BLctxxbds8gmPL0W9LzTWQkrVgSWaHV9e4rE8swA6dE7vGnr17-iOwzpLutpmwh5NLTFWOvCv2UEp00PMYLBHHS_-X6WvS-4O2/s1600-h/FINAL_graphORIT.jpg"><img style="cursor:pointer; cursor:hand;width: 400px; height: 218px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm8O8rz2tuhArC3YECFgzPa9fwI0TnDcSGxIB9I-vVn6BLctxxbds8gmPL0W9LzTWQkrVgSWaHV9e4rE8swA6dE7vGnr17-iOwzpLutpmwh5NLTFWOvCv2UEp00PMYLBHHS_-X6WvS-4O2/s400/FINAL_graphORIT.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5400715459711619122" /></a></a>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com2tag:blogger.com,1999:blog-2870434950585132573.post-74208839255005805232009-11-03T10:49:00.000-08:002009-11-03T10:51:11.671-08:00Moving Toward Dynamic TechnologiesIn the article, McGreal and Elliott (2008) examine some of the latest multimedia technologies used in online classes. The article also offers suggestions for the use of the multimedia in an instructional setting. Moller (2008) states that dynamic tools: “involve learner on a much deeper level” (pp.1). Moller (2008) uses an interesting analogy when he compares the integration of technology to crafting a new recipe (pp.2). The instructor should use his experience with technology to wisely choose technology with which he is familiar and according to the skills of his students. Although, Fahy (2008) states: “technological trends tend to translate rapidly from culture to the (virtual classroom),” pedagogues have to be selective with regards to which multimedia tools they integrate into the classroom (pp.168). <br /><br />Moller (2008) writes: “technology can be conceptualized along a continuum of static to dynamic” (pp.1). Furthermore, not all technologies create an active learner; web pages, podcasts, eBooks, Google scholar may contribute to learner’s knowledge, but they are static tools. Learning will be generated as expected in a traditional environment, where the learner is a passive receiver of information. Moller (2008) states that static technologies allow learner “to capture information,” and the reason they are popular is because they “mimic traditional environment” (pp.1), a zone of comfort for many educators. <br /><br />As I read McGreal and Elliott’s (2008) article, I was mentally marking multimedia tools that I can use in my web design and eBusiness classes. Since I prepare my students to be integrated into the 21st century work force, there is a need for students to learn to communicate and work in concert. Dynamic tools involve learning on a “deeper cognitive level” (Moller, 2008, pp.1) by preparing students to be able to construct knowledge not provided by the instructor. <br /><br />Reference: <br /><br />Fahy, H. (2008). Characteristics of Interactive Online Learning Media. The theory and practice of online learning (T. Anderson, Ed.). Edmonton, AB: Athabasca University Press.<br /><br />McGreal, R. & Elliott , M.,(2008). Technologies of Online Learning (E-Learning). The theory and practice of online learning (T. Anderson, Ed.). Edmonton, AB: Athabasca University Press. <br /><br />Moller, L. (2008). Static and dynamic technological tools. [Unpublished Paper].Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com0tag:blogger.com,1999:blog-2870434950585132573.post-24811758673330201212009-10-24T15:31:00.001-07:002009-10-25T06:04:06.738-07:00Engaging Learners with New Strategies and Tools<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3X-6ptLtC5YvJC3FsKzjYPsWwbAqokagFEXvkRZXJ69NqwFrj0VB6HlIG5m96GNv6turS0sbUDkIP719LCtTYmZwISX7in9exzk14InhCgrCfEHL0obcJUatv5ynimflIGAu4t35GipMN/s1600-h/blog_4_graphic-2.jpg"><img style="cursor:pointer; cursor:hand;width: 400px; height: 372px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3X-6ptLtC5YvJC3FsKzjYPsWwbAqokagFEXvkRZXJ69NqwFrj0VB6HlIG5m96GNv6turS0sbUDkIP719LCtTYmZwISX7in9exzk14InhCgrCfEHL0obcJUatv5ynimflIGAu4t35GipMN/s400/blog_4_graphic-2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5396506200090973794" /></a><br /><br /><P><br /> Technology allows for the opportunity to connect education to the outside environment and to generate an interactive learning environment that can connect education to the work environment as well. The World Wide Web gives an opportunity to retrieve information and can help create an active and motivated student. Anderson (2008) suggests the use of “net-based audio graphic session” so that the students and professors can build a relationship online and so that both can learn more about each other (pp. 349). It is difficult to build the same level of collaborative environment online that can be found in a traditional class due to the social factors that are missing for both the student and instructor. However, the visual cues are being replaced by emoticons, video chats such as Skype, IM and other forms of computer-mediated communication which are instrumental in creating a collaborative environment. Furthermore, Siemens (2008) remarks that although information is available online, it is presented in a fragmented way, unlike textbooks where the information is collected in an organized manner (pp 13). This is a valid point; the instructor can generate a class library where information can be posted pertaining to assigned topics, a list of suggestions or even a suggested list of technological tools. For example, when I taught an Adobe Flash class, I reviewed and posted a suggested list of YouTube tutorials in order to create a better learning environment. The students were not distracted by searching endlessly for tutorials and were not derailed with futile, unqualified information. Additionally, Siemens (2008) made a strong analogy with regards to the role of the instructor as a “curator” in online education who brings together resources for the student to create an effective learning and teaching environment.<br />The strategies proposed by Terry Anderson (2008) focus on creating a learning environment where not only are the learner’s needs are accessed individually, but where the growth of critical thinking skills and social presence are nurtured and developed by the establishment of a supportive pedagogical environment as well. Anderson (2008) suggests: “community of inquiry model” which are the “cognitive presence,” “social presence” and “teaching presence” (pp.344). Additionally, Anderson (2008) states that in order to develop and support critical thinking in the learner, the content of the learning has to “work within the epistemological, cultural and social expression” (pp344).<br /> Moreover, time management is an important factor on the part of the instructor as it incorporates a timely assessment of learning and communication with the students. Anderson (2008) states that the educator must maintain his presence throughout the discussions in order to support the generation of collaborative learning environment (pp. 349). Additionally, Anderson (2008) emphasizes that the instructor must be comfortable using new and developing technologies in an innovative environment and that his pedagogical skills must reflect an understanding of a collaborative or independent online learning environment (pp.360).<br />Furthermore, an effective online instructor has to devise, implement and modify a student’s activity according to the class dynamic and to not be confined to the same conventions or to a long-established package (Anderson, 2008, pp.346).<br /> Siemens (2008) echoes Anderson when stating that an instructor’s role is to be present as an expert or a “curator” who presents a “map,” in order to provide clear instructions and enhance the education of the student by navigating the student to new resources or learning devises of which the student might not be aware (pp.16). Thus, the instructor cannot be only an observer, he must be an active participator. The goal of the educator is to prepare the students for “active engagement” (pp.14). In order to do so, an effective instructor has to create opportunities for the learner to express his standpoint in a more engaging form, thereby allowing him the space to reflect on the reading and to emphasize his point-of-view (pp.15).<br /><br /><br />Resources:<br />Anderson, T. (Ed.). (2008). The theory and practice of online learning (2nd ed.). Edmonton, AB: Athabasca University Press.<br />Siemens, G. (2008, January 27). Learning and Knowing in Networks: Changing roles for Educators and Designers. Retrieved October 19, 2009, from Presented to ITFORUM for Discussion: http://it.coe.uga.edu/itforum/Paper105/Siemens.pdfOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com6tag:blogger.com,1999:blog-2870434950585132573.post-5836957666797352282009-10-13T10:41:00.000-07:002009-10-13T10:45:26.209-07:00Blog Posting: Assessing Collaborative EffortsHow should participation in a collaborative learning community be assessed? How do the varying levels of skill and knowledge students bring to a course affect the instructor's "fair and equitable assessment" of learning?<br /><br />In distance education, the responsibility falls on the instructor and the student to have a valid assessment. A set of assessments tools have to be developed which uniquely apply to the topic and the group of students. In the video Assessment of collaborative learning, George Siemans (2008) suggests peer assessing, communities feedback from online communities and educators assessments based on student contribution. Palloff and Pratt (2005) suggest including a “reflective process” which should include student self assessment as well (pp.42-43). Furthermore, rubrics are an effective tool to have a “fair and equitable assessment” (Palloff and Pratt, 2005, pp.44). Through the rubrics, the students are aware of what is expected of them and they can self-assess their knowledge (Palloff and Pratt, 2005, pp.44). <br />The assessment of a student can never have clear guidelines as there are always external factors that might contribute or deduct from a student’s success, such as some technological issues, time and not having a clear understanding of the assignment. In a traditional class, any misunderstandings can be clarified during the lessons, unlike an online class, where the student might not even be aware that he misunderstood the assignment and only realizes it after the instructor’s assessment is completed. Through discussions, the instructor can assess not only the class level, but also the individual students. <br />With regards to assessing a student’s participation in my class, while it is not an online class but a traditional one, some aspects of it can be applied to an online class. For a quantitative measure, the students have to present their projects on time in class. I asses each presentation by evaluating if they adhered to the rubric and if their presentation promoted further class discussion. For the qualitative method, I asses the students’ presentations and group projects on how well the topic was presented by evaluating how well the group collaborated on the project and through their classmates’ feedback, questions and comments. Siemens (2008) suggests a rating scheme by rating an outside article by a class member, to encourage students to participate in open communities and to receive feedback from outside members for self evaluation. This can be done by posting a blog or writing a review of an article. <br /> <br />Second, if a student does not want to network or collaborate in a learning community for an online course, what should the other members of the learning community do?<br /><br />Palloff and Pratt (2005) write that people who lead and work in “virtual teams need to have special skills” (pp.11) which means an understanding of cultures, human dynamics and the ability to use technology effectively. The instructor can empower the online community to encourage its member’s participation by generating clear guidelines through the rubrics and by building trust in the community. Through instructor’s encouragement, the community of students has to motivate itself to successfully contribute to the learning environment. Paloff and Pratt (2007) suggest “human contact” (pp.48) such as a phone call, Skype, e-mail, and Google video if there are no time zone limitations or other outside restrictions beyond the group’s control. Doing so can help to keep the community less silent, eliminate barriers and generates a sense of belonging and engagement with the other members of the community, the instructor or other students.<br />Moller at el. (2005) state that the social environment in an online class can motivate students by generating group ties and promoting communication through social interaction and peer-to -peer learning. According to the research’s conclusion, groups do have a motivational impact on learners and other studies also suggest that a “sense of community leads to greater motivation” (Moller at el., 2005, pp.140-141).<br /><br />What role should the instructor play? What impact would this have on his or her assessment plan?<br /><br />Achieving an effective learning community and a collaborative environment can be challenging in online class. Palloff and Pratt (2005) suggest for the instructor to create small groups, to present material to their peers, to post assignments for mutual feedback and to create social presence (pp.9). The instructors’ role is to act as the coach by making sure the collaboration is present in the community. The instructor’s assessment plan has to change from an individual-based model to a collaborative-assessment model. <br /><br /><br />Reference: <br />Moller, L., Huett, J., Holder, D., Young, J., Harvey, D., & Godshalk, V. (2005). Examining the impact of learning communities on motivation. Quarterly Review of Distance Education, 6(2), 137-143. http://search.ebscohost.com.kbcc.ezproxy.cuny.edu:2048<br /><br />Palloff, R. M., & Pratt, K. (2007). Building Online Learning Communities effective strategies for the virtual classroom. San Francisco, CA: Jossey-Bass.<br /><br />Palloff, R. M., & Pratt, K. (2005). Collaborating Online Learning Together in Community. San Francisco, CA: Jossey-Bass.<br /><br />Siemens, G. (Speaker). (2008). Assessment of collaborative learning (Transcript of Video Program). Laureate Education, Inc.<br /><br />Siemens, G. (Speaker). (2008). Learning Communities (Transcript of Video Program). Laureate Education, Inc.<br /><br />Swan, K. (2004). Relationships between interactions and learning in online environments.. Retrieved October 12, 2009, from The Sloan Consortium.: http://sloan-c.org/publications/books/interactions.pdfOrit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com2tag:blogger.com,1999:blog-2870434950585132573.post-83485157128957800692009-10-02T11:51:00.000-07:002009-10-02T12:26:24.373-07:00Cyber- Language Project<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0IaLbnOJb6n4UNo3RTumvKDy-8A7zu3XSNut7NV-IAoHHwRTu6o0Wn5OwZK8nJ7QuGRmTiJFEaiY4tlyjRaRbgJKlq4kijldvYsKxc7NMVavGqEc0KYZZ_n-U7pY3AyapwNK7RzEYTI9/s1600-h/just.jpg"><img style="cursor: pointer; width: 400px; height: 126px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0IaLbnOJb6n4UNo3RTumvKDy-8A7zu3XSNut7NV-IAoHHwRTu6o0Wn5OwZK8nJ7QuGRmTiJFEaiY4tlyjRaRbgJKlq4kijldvYsKxc7NMVavGqEc0KYZZ_n-U7pY3AyapwNK7RzEYTI9/s400/just.jpg" alt="" id="BLOGGER_PHOTO_ID_5388085887406382498" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBbbqlPlUbNKQIwBxjGFZAmCTAIirsnzsjeTPpPr1q_d6NuH7OsrMjvQ61UV3GAFRB-xMADWHP2KClpIrkN5CHlywsrKEjWPt4I-ob5uLn2RnCDrhq8lzGwlB79-G4gyc4HeW-wo8iV5l2/s1600-h/outline.jpg"><img style="cursor: pointer; width: 400px; height: 291px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBbbqlPlUbNKQIwBxjGFZAmCTAIirsnzsjeTPpPr1q_d6NuH7OsrMjvQ61UV3GAFRB-xMADWHP2KClpIrkN5CHlywsrKEjWPt4I-ob5uLn2RnCDrhq8lzGwlB79-G4gyc4HeW-wo8iV5l2/s400/outline.jpg" alt="" id="BLOGGER_PHOTO_ID_5388085978485037010" border="0" /></a><br /><br /><br /><br /><p class="MsoNormal"><o:p> </o:p></p>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com3tag:blogger.com,1999:blog-2870434950585132573.post-56203626448716737452009-09-25T07:56:00.000-07:002009-09-25T07:57:14.499-07:00An Organizational Diffusion Study on Distance Education done by The University of West Georgia:<br /><br /><a href="http://www.westga.edu/~distance/ojdla/winter84/smith84.htm">http://www.westga.edu/~distance/ojdla/winter84/smith84.htm</a>Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com0tag:blogger.com,1999:blog-2870434950585132573.post-45077632561764787742009-09-21T17:25:00.000-07:002009-09-25T07:59:56.264-07:00EDUC 8842 Module 2: Elements of distance education diffusionGeorge Siemens (n.d.) states that the growth of distance education is attributed to the growth of the Internet and as more people use the web and are more comfortable conversing through it, the more they will become comfortable in accepting distance education (para. 1). Furthermore, George Siemens states that due to technological advances and ease of use, there is no need to have any special technical skills to communicate online, send emails, attach a picture or have a video discussion with a group or individual (para. 3-4). The third element of distance education diffusion is the “triple-helix model” (para. 5), which is the interaction between the government, the universities and commerce to create a new discourse and to empower students in an online environment.<br /><br /><span style="font-family:arial;color:#000099;"><strong>My outlook:</strong></span><br />Siemens (n.d.) pinpoints the reasons for the growth of distance education. In my opinion, although all are important and valid points, the “triple-helix model” (para. 5) stands out the most. The accreditation of a distance education institution by the government makes an online degree from that institution recognizable, which makes it valid for other universities and employers.<br />Moreover, due to social networks and tools such as Skype, blogs, and WIKI, collaboration and interaction is available and can create a combination of asynchronous and or synchronous communication among the class members and the instructor.<br /><br />Reference:<br /><br />Siemens, G. (n.d.) The Future of Distance Education. [Study video]. Retrieved September 21, 2009, from http://sylvan.live.ecollege.com/ec/crs/default.learn? M02Video02-8a53b7841e26a5ad011e2d290c5c0018_LARGE_MP4 .Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com3tag:blogger.com,1999:blog-2870434950585132573.post-57928977778367244852009-09-13T11:34:00.000-07:002009-09-13T11:38:33.522-07:00EDUC 8842 Module 1: Evolving Distance Education to the Next Generation<span style="font-size:130%;color:#000099;"><strong>Comparison contrast and summary of authors view point:</strong><br /></span><br />In the series or three articles by Moller, Foshay, Huett (2008, 2008, 2008), the authors discuss e-learning at various levels: corporate, higher Education and K-12. In the video by Simonson (n.d.), he provided a general overview of distance education and his view of the future of distance education.<br /><br />Moller, et al. and Simonson have the same opinion with regards to the importance of changing the prospective of distance education. Distance education is growing rapidly (Simons, n.d) , but the general public and some of the administrators in the educational and corporate field do not understand the importance of differentiating between face-to-face education and the distance education. Therefore, it generates problems for educators and e-learners. Lack of qualified distance education educators creates an ineffectual learning environment which reflects poorly on distance education in general rather than the instructor’s specific method of instruction. With regards to distance learning: Learners do not know how to evaluate “poorly designed e- learning” (Moller, et al., 2008, May/June, p. 71) nor can they recognize the relative value of one school and that poor quality hurts everybody.<br /><br />Moller, et al. and Simonson emphasize the economical factors which induce e-Learning growth. It is convenience for private or public corporate and educational sectors because it is scalable, available on demand, cost effective and reachable in developed and developing countries. All authors agree that e-learning is broken down to distance teaching and distance learning. <br /><br />There are dissimilarities in the viewpoints of Moller, et al. and Simonson. Simonson states in comparison to Everett Rodger’s “S-shaped curve of adoption of new ideas” (Simonson, n.d.) that distance education is at the point where it will continue to grow and be incorporated starting from K-12 and beyond, but the paradigm will not change drastically (Simonson, n.d.). Moller, et al. (2008) emphasizes that in order for distance education to be successful, it must improve its learning models (p. 78)<br /> <br /><span style="font-size:130%;color:#000066;"><strong>My outlook:</strong></span><br />I strongly agree with Moller, et al. (2008) and Simonson, (n.d.) that in order for distance learning to be successful, educators, educational administration, and business managers must reevaluate its understanding of what e-learning is and reevaluate its policies. I do not completely accept Simonson’s point that distance education is widely acknowledged, although it is widely used. In addition, in many brick-and-mortar schools distance education is still being undermined, measured up and forced to implement face-to-face modules. Not every educator can teach a distance education class while not every student can succeed in e-learning classes. Distance education classes have different dynamic, and both the educator and the student must understand that e-learning is not synonymous with “easy”.<br /><br />Reference:<br />Moller, L., Foshay, W., & Huett, J. (2008, May/June). The evolution of distance education: Implications for instructional design on the potential of the web (Part 1: Training and development). TechTrends, 52(3), 70-75. Use the Academic Search Premier database, and search using the article's Accession Number: 33281719.<br /><br />Moller, L., Foshay, W., & Huett, J. (2008, May/June). The evolution of distance education: Implications for instructional design on the potential of the web (Part 2: Higher education). TechTrends, 52(4), 66-70. Use the Academic Search Premier database, and search using the article's Accession Number: 33991516.<br /><br />Huett, J., Moller, L., Foshay, W., & Coleman, C. (2008, September/October). The evolution of distance education: Implications for instructional design on the potential of the web (Part 3: K12). TechTrends, 52(5). 63-67.<br /><br />Simonson, M. (n.d.) Distance Education: The Next Generation. [Study video]. Retrieved September 12, 2009, from http://sylvan.live.ecollege.com/ec/crs/default.learn?CourseID=3206859&Survey=1&47=5050260&ClientNodeID=984645&coursenav=1&bhcp=1.Orit Hirsh,Ph.D.http://www.blogger.com/profile/10781390038542806317noreply@blogger.com8