Viewpoint


Mickey Spillane Versus Wiley Hacker

Who is qualified to conduct computer forensics: computer jocks or private eyes? A number of states are answering that question private investigators. Read on to see what this may mean to your campus.

Automation Chimera: Education Is Not Management

The lure of automating workflow online so human intervention is minimized is continually reinforced in the minds of higher education administrators by examples of automated campus systems such as financials, student information systems, and other enterprise systems. But what's good for management is not always good for learning.

The (Campus) Empire Strikes Back

Adding to the slew of data security issues already plaguing college and university campuses is an onslaught of stealth malware and botnet attacks. What's a beleaguered network manager to do? Here, from UC-Berkeley's own network pro, a cache of helpful advice.

The Educational Software Paradox: Can We Learn To Unlearn?

New "educational" software and applications are usually not as educational as one might think. As a whole, applications developed in the name of learning have ended up favoring the institution and preserving the status quo. Given existing dynamics, it could not be otherwise.

Podcasting in Instruction: Moving Beyond the Obvious

The lightweight, mobile nature of podcasting has the potential of moving education beyond familiar constraints of coursework and promoting a level of networking and input never seen before. But challenges still exist. Can more be achieved with podcasting that would heighten student engagement and maximize knowledge building in instructional contexts? Can we move beyond the obvious in their use?



Learning in the Webiverse: How Do You Grade a Conversation?

Academics have long talked of the "academic conversation." Now, Web 2.0 has called our bluff. We live in the midst of a non-stop world conversation. But, are conversational skills (in writing) important and, if so, how do we teach them?

P2P Redux: New Twists and Turns

At the same time that RIAA has been bombarding campuses with P2P filesharing notices, questions are being raised about the underlying legality of the methods being used by the RIAA.

Can We Trust Students to Learn in Web 2.0?

A core debate about learning design arises from the fear that, if we allow learners too much freedom, they will not learn the right things. Web 2.0 exacerbates that fear because it is beyond the control of educators.

Firewalls: A Hammer in Search of a Nail

The use of a firewall to protect a local or campus network from external threats has become enshrined as "best practice." But how well does it really work, how much protection does it really provide, and what are the negative impacts on advanced applications?

Frankenstein in the University

In our day-to-day encounters with new media, online education, and vendor software products, we may sometimes be tempted to believe that encroaching technology is controlling the way people teach and learn. Is there a monster in our midst, determining our actions?