The lure of automating workflow online so human intervention is minimized is continually reinforced in the minds of higher education administrators by examples of automated campus systems such as financials, student information systems, and other enterprise systems. But what's good for management is not always good for learning.
Adding to the slew of data security issues already plaguing college and university campuses is an onslaught of stealth malware and botnet attacks. What's a beleaguered network manager to do? Here, from UC-Berkeley's own network pro, a cache of helpful advice.
The lightweight, mobile nature of podcasting has the potential of moving education beyond familiar constraints of coursework and promoting a level of networking and input never seen before. But challenges still exist. Can more be achieved with podcasting that would heighten student engagement and maximize knowledge building in instructional contexts? Can we move beyond the obvious in their use?
New "educational" software and applications are usually not as educational as one might think. As a whole, applications developed in the name of learning have ended up favoring the institution and preserving the status quo. Given existing dynamics, it could not be otherwise.
Academics have long talked of the "academic conversation." Now, Web 2.0 has called our bluff. We live in the midst of a non-stop world conversation. But, are conversational skills (in writing) important and, if so, how do we teach them?
At the same time that RIAA has been bombarding campuses with P2P filesharing notices, questions are being raised about the underlying legality of the methods being used by the RIAA.
A core debate about learning design arises from the fear that, if we allow learners too much freedom, they will not learn the right things. Web 2.0 exacerbates that fear because it is beyond the control of educators.
The use of a firewall to protect a local or campus network from external threats has become enshrined as "best practice." But how well does it really work, how much protection does it really provide, and what are the negative impacts on advanced applications?
In our day-to-day encounters with new media, online education, and vendor software products, we may sometimes be tempted to believe that encroaching technology is controlling the way people teach and learn. Is there a monster in our midst, determining our actions?
There has been a lot of recent debate on the benefits of social networking tools and software in education. While there are good points on either side of the debate, there remains the essential difference in theoretical positioning. Can social networking both as an instructional concept and user skill be integrated into the conventional approaches to teaching and learning? Do the skills developed within a social networking environment have value in the more conventional environments of learning?