At a time when the most startling and exciting learning environments are being created in Web 2.0, the computing establishment on campus has enough to do just to keep the big pipes and big iron running. Innovation in learning around technology, therefore, needs a separate administrative support structure and a top-level advocate who reports in parallel to central computing.
Who is qualified to conduct computer forensics: computer jocks or private eyes? A number of states are answering that question private investigators. Read on to see what this may mean to your campus.
The lure of automating workflow online so human intervention is minimized is continually reinforced in the minds of higher education administrators by examples of automated campus systems such as financials, student information systems, and other enterprise systems. But what's good for management is not always good for learning.
Adding to the slew of data security issues already plaguing college and university campuses is an onslaught of stealth malware and botnet attacks. What's a beleaguered network manager to do? Here, from UC-Berkeley's own network pro, a cache of helpful advice.
New "educational" software and applications are usually not as educational as one might think. As a whole, applications developed in the name of learning have ended up favoring the institution and preserving the status quo. Given existing dynamics, it could not be otherwise.
The lightweight, mobile nature of podcasting has the potential of moving education beyond familiar constraints of coursework and promoting a level of networking and input never seen before. But challenges still exist. Can more be achieved with podcasting that would heighten student engagement and maximize knowledge building in instructional contexts? Can we move beyond the obvious in their use?
Academics have long talked of the "academic conversation." Now, Web 2.0 has called our bluff. We live in the midst of a non-stop world conversation. But, are conversational skills (in writing) important and, if so, how do we teach them?
At the same time that RIAA has been bombarding campuses with P2P filesharing notices, questions are being raised about the underlying legality of the methods being used by the RIAA.
A core debate about learning design arises from the fear that, if we allow learners too much freedom, they will not learn the right things. Web 2.0 exacerbates that fear because it is beyond the control of educators.
The use of a firewall to protect a local or campus network from external threats has become enshrined as "best practice." But how well does it really work, how much protection does it really provide, and what are the negative impacts on advanced applications?