Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items tagged computers

Rss Feed Group items tagged

Trapper Callender

Man-Computer Symbiosis - 2 views

  • In short, it seems worthwhile to avoid argument with (other) enthusiasts for artificial intelligence by conceding dominance in the distant future of cerebration to machines alone.
  • There will nevertheless be a fairly long interim during which the main intellectual advances will be made by men and computers working together in intimate association. A multidisciplinary study group, examining future research and development problems of the Air Force, estimated that it would be 1980 before developments in artificial intelligence make it possible for machines alone to do much thinking or problem solving of military significance. That would leave, say, five years to develop man-computer symbiosis and 15 years to use it. The 15 may be 10 or 500, but those years should be intellectually the most creative and exciting in the history of mankind.
  • It is often said that programming for a computing machine forces one to think clearly, that it disciplines the thought process. If the user can think his problem through in advance, symbiotic association with a computing machine is not necessary.
  • ...25 more annotations...
  • They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution.
  • Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems.
  • It is to bring computing machines effectively into processes of thinking that must go on in "real time," time that moves too fast to permit using computers in conventional ways.
  • To think in interaction with a computer in the same way that you think with a colleague whose competence supplements your own will require much tighter coupling between man and machine than is suggested by the example and than is possible today.
  • Throughout the period I examined, in short, my "thinking" time was devoted mainly to activities that were essentially clerical or mechanical: searching, calculating, plotting, transforming, determining the logical or dynamic consequences of a set of assumptions or hypotheses, preparing the way for a decision or an insight. Moreover, my choices of what to attempt and what not to attempt were determined to an embarrassingly great extent by considerations of clerical feasibility, not intellectual capability.
  • the operations that fill most of the time allegedly devoted to technical thinking are operations that can be performed more effectively by machines than by men.
  • If those problems can be solved in such a way as to create a symbiotic relation between a man and a fast information-retrieval and data-processing machine, however, it seems evident that the cooperative interaction would greatly improve the thinking process.
  • Computing machines can do readily, well, and rapidly many things that are difficult or impossible for man, and men can do readily and well, though not rapidly, many things that are difficult or impossible for computers. That suggests that a symbiotic cooperation, if successful in integrating the positive characteristics of men and computers, would be of great value. The differences in speed and in language, of course, pose difficulties that must be overcome.
  • Men will fill in the gaps, either in the problem solution or in the computer program, when the computer has no mode or routine that is applicable in a particular circumstance.
  • Clearly, for the sake of efficiency and economy, the computer must divide its time among many users. Timesharing systems are currently under active development. There are even arrangements to keep users from "clobbering" anything but their own personal programs.
  • It seems reasonable to envision, for a time 10 or 15 years hence, a "thinking center" that will incorporate the functions of present-day libraries together with anticipated advances in information storage and retrieval and the symbiotic functions suggested earlier in this paper. The picture readily enlarges itself into a network of such centers, connected to one another by wide-band communication lines and to individual users by leased-wire services. In such a system, the speed of the computers would be balanced, and the cost of the gigantic memories and the sophisticated programs would be divided by the number of users.
  • The first thing to face is that we shall not store all the technical and scientific papers in computer memory. We may store the parts that can be summarized most succinctly-the quantitative parts and the reference citations-but not the whole. Books are among the most beautifully engineered, and human-engineered, components in existence, and they will continue to be functionally important within the context of man-computer symbiosis. (Hopefully, the computer will expedite the finding, delivering, and returning of books.)
  • The second point is that a very important section of memory will be permanent: part indelible memory and part published memory. The computer will be able to write once into indelible memory, and then read back indefinitely, but the computer will not be able to erase indelible memory. (It may also over-write, turning all the 0's into l's, as though marking over what was written earlier.) Published memory will be "read-only" memory. It will be introduced into the computer already structured. The computer will be able to refer to it repeatedly, but not to change it.
  • The basic dissimilarity between human languages and computer languages may be the most serious obstacle to true symbiosis.
  • In short: instructions directed to computers specify courses; instructions-directed to human beings specify goals.
  • We may in due course see a serious effort to develop computer programs that can be connected together like the words and phrases of speech to do whatever computation or control is required at the moment. The consideration that holds back such an effort, apparently, is that the effort would produce nothing that would be of great value in the context of existing computers. It would be unrewarding to develop the language before there are any computing machines capable of responding meaningfully to it.
  • By and large, in generally available computers, however, there is almost no provision for any more effective, immediate man-machine communication than can be achieved with an electric typewriter.
  • Displays seem to be in a somewhat better state than controls. Many computers plot graphs on oscilloscope screens, and a few take advantage of the remarkable capabilities, graphical and symbolic, of the charactron display tube. Nowhere, to my knowledge, however, is there anything approaching the flexibility and convenience of the pencil and doodle pad or the chalk and blackboard used by men in technical discussion.
  • 2) Computer-Posted Wall Display: In some technological systems, several men share responsibility for controlling vehicles whose behaviors interact. Some information must be presented simultaneously to all the men, preferably on a common grid, to coordinate their actions. Other information is of relevance only to one or two operators. There would be only a confusion of uninterpretable clutter if all the information were presented on one display to all of them. The information must be posted by a computer, since manual plotting is too slow to keep it up to date.
  • Laboratory experiments have indicated repeatedly that informal, parallel arrangements of operators, coordinating their activities through reference to a large situation display, have important advantages over the arrangement, more widely used, that locates the operators at individual consoles and attempts to correlate their actions through the agency of a computer. This is one of several operator-team problems in need of careful study.
  • 3) Automatic Speech Production and Recognition: How desirable and how feasible is speech communication between human operators and computing machines?
  • Yet there is continuing interest in the idea of talking with computing machines.
  • In large part, the interest stems from realization that one can hardly take a military commander or a corporation president away from his work to teach him to type. If computing machines are ever to be used directly by top-level decision makers, it may be worthwhile to provide communication via the most natural means, even at considerable cost.
  • It seems reasonable, therefore, for computer specialists to be the ones who interact directly with computers in business offices.
  • Certainly, if the equipment were already developed, reliable, and available, it would be used.
  •  
    Man-computer symbiosis is an expected development in cooperative interaction between men and electronic computers. It will involve very close coupling between the human and the electronic members of the partnership. The main aims are 1) to let computers facilitate formulative thinking as they now facilitate the solution of formulated problems, and 2) to enable men and computers to cooperate in making decisions and controlling complex situations without inflexible dependence on predetermined programs. In the anticipated symbiotic partnership, men will set the goals, formulate the hypotheses, determine the criteria, and perform the evaluations. Computing machines will do the routinizable work that must be done to prepare the way for insights and decisions in technical and scientific thinking. Preliminary analyses indicate that the symbiotic partnership will perform intellectual operations much more effectively than man alone can perform them. Prerequisites for the achievement of the effective, cooperative association include developments in computer time sharing, in memory components, in memory organization, in programming languages, and in input and output equipment.
Smith jhon

Be a Smart User of Dell Computer - 0 views

  •  
    Are you still facing the issues about exception errors in dell computer while you are using dell computer? Then what are you waiting for? Here is http://uksupportnumber.co.uk/dell-computer is always available for providing you all types of solution related to it. You need to just call Dell Computer Support Number 08000988312. Our customers care support executive will help you at 24x7
samantha armstrong

FixComputerpProblemsSite Surely Knows How to Fix Computer Problems! - 1 views

I was having problems with my laptop before. Good thing FixComputerpProblemsSite helped me fix it. And they are really the experts when it comes to solving any computer related issues. They can eas...

fix computer problems

started by samantha armstrong on 12 May 11 no follow-up yet
sam neilson

FixComputerpProblemsSite Surely Knows How to Fix Computer Problems! - 1 views

I was having problems with my laptop before. Good thing FixComputerpProblemsSite helped me fix it. And they are really the experts when it comes to solving any computer related issues. They can eas...

fix computer problems

started by sam neilson on 11 May 11 no follow-up yet
seth kutcher

Remote Online PC Support I Can Rely On - 1 views

I availed of the remote computer support services of Remote Computer Support Site because their services are proven to be very fast and accurate. They have expert online computer tech professiona...

remote computer support

started by seth kutcher on 12 Sep 11 no follow-up yet
felix montgomery

Fix Computer trouble with Fix Computer Today - 1 views

I have an online business. And because all my products are being purchased through the net, I basically, I use my computer every now and then. I need to monitor my sales as well as keep in touch to...

fix computer

started by felix montgomery on 13 Jul 11 no follow-up yet
seth kutcher

Excellent Computer Repair Service - 1 views

My work relies heavily on computer. That is why I cannot afford to delay my report just because I am having computer problems. I bought this computer unit 5 years ago and maybe because it is alread...

computer repair

started by seth kutcher on 02 Nov 11 no follow-up yet
Trapper Callender

Doug Engelbart 1968 Demo - 2 views

  •  
    On December 9, 1968, Douglas C. Engelbart and the group of 17 researchers working with him in the Augmentation Research Center at Stanford Research Institute in Menlo Park, CA, presented a 90-minute live public demonstration of the online system, NLS, they had been working on since 1962. The public presentation was a session of the Fall Joint Computer Conference held at the Convention Center in San Francisco, and it was attended by about 1,000 computer professionals. This was the public debut of the computer mouse. But the mouse was only one of many innovations demonstrated that day, including hypertext, object addressing and dynamic file linking, as well as shared-screen collaboration involving two persons at different sites communicating over a network with audio and video interface.
timmhaubrich532

Buy Skype Account - 100% Real & low price - 0 views

  •  
    Buy Skype Account Introduction Skype Account Purchase VoIP service Skype users can make voice and video calls over the internet. It also provides instant messaging tools. Microsoft-owned Skype is one of the most popular VoIP services available. There are two ways to buy Skype accounts. The first choice is to purchase Skype credit, which works for both landlines and mobile phones. The second choice is to subscribe to Skype for Business, a monthly service that allows users to make an unlimited number of calls to both landlines and mobile devices. What exactly is Skype? A piece of software called Skype enables users to conduct voice and video calls over the internet. On a computer, smartphone, or tablet, Skype can be utilized. Free to download and simple to use, Skype. On a computer, smartphone, or tablet, Skype can be utilized. Free to download and simple to use, Skype. Buy Skype Account You can contact landlines and mobile phones using Skype, as well as call other Skype users. Calls made using Skype include high-quality audio and cost less than traditional phone calls. Skype can be used to share data and images, as well as to speak with loved ones. You need a Skype account in order to use Skype. A free Skype account can be made. Visit skype.com and select "Create an account" to register for a Skype account. Your name, email address, and a Skype login and password must be provided. Skype is a fantastic tool for keeping in touch with friends and family all across the world. You may phone, chat, and share files and pictures with Skype. Create a Skype account right now because it is free and simple to use! What are Skype's advantages? You need a reliable technique to communicate with your far-flung friends and family when you want to keep in touch with them. One of the better possibilities is Skype, which offers a variety of advantages. Buy Skype Account First of all, using Skype is pretty simple. You can start using the program right away if you have a stron
  •  
    Skype Account Purchase VoIP service Skype users can make voice and video calls over the internet. It also provides instant messaging tools. Microsoft-owned Skype is one of the most popular VoIP services available. There are two ways to buy Skype accounts. The first choice is to purchase Skype credit, which works for both landlines and mobile phones. The second choice is to subscribe to Skype for Business, a monthly service that allows users to make an unlimited number of calls to both landlines and mobile devices.
  •  
    Skype Account Purchase VoIP service Skype users can make voice and video calls over the internet. It also provides instant messaging tools. Microsoft-owned Skype is one of the most popular VoIP services available. There are two ways to buy Skype accounts. The first choice is to purchase Skype credit, which works for both landlines and mobile phones. The second choice is to subscribe to Skype for Business, a monthly service that allows users to make an unlimited number of calls to both landlines and mobile devices.
Adam Bohannon

Heidegger 2 Twitter: Technology, Self & Social Networks. - 11 views

  • Both object and subject are converted to a โ€œstanding-reserveโ€, to be disaggregated, redistributed, recontextualized, and reaggregated.
  • And human individuals, who were once reduced to resources (Frederick Taylor, and the authoritarianism of Human Resource departments), or โ€œeyeballsโ€ in the terminology of internet marketing executives; are now the creative engines of growth, innovation, and creativity.
  • This becomes even more interesting when we wonder about the context and meaning of start-ups intentionally exposing their office spaceโ€™s ductwork - as if the open office with exposed pipes re-instantiates a manifestation of the hearth, or at least โ€˜un-hidesโ€™ the circulatory system of commerce.
  • ...16 more annotations...
  • Postmodern technology uses the hyper-reality of simulations to get rid of the limitations imposed by reality. The limit of postmodern reality is not the total objectification of nature, but the replacement of reality by virtual reality totally under our control.
  • Borgmannโ€™s antidote for losing our personality to the shallowness and superficiality of hyper-reality is to return to focal activities.
  • It takes commitment on our part to engage in focal activities, but the effort affords us a chance to maintain some sense of self in the technological world.
  • Thus technological rationality can claim that technologies are value neutral, and only uses are good or evil, despite the fact that the uses are shaped by the technologies.
  • And technology leads to new forms of domination. For the critical theorists history has always had domination, but in our time domination has changed from master over slave or lord over serf to the domination of humanity by economics and the market. We are given the illusion of liberty, but that is simply the freedom to choose between brands of mass-produced products.
  • Computer technology further de-contextualizes human experience by emphasizing information over understanding. And computers further domination by providing new means of tracking the productivity of workers to the corporation and depersonalizing supervision; very much a modern panopticon envisioned by Jeremy Bentham.
  • Foucaultโ€™s view allows for the possibility that information technology could be used to put people in more direct communication with each other and spread the concentration of power over society.
  • MS Word and freely available blogging software encourages us to constantly revise, so a work becomes a series of drafts, none of which is final (just like this post).
  • Gouldโ€™s attitude towards design finds philosophical support in pragmatism. Pragmatism recognizes that everyone is socially situated. Dewey taught that scientific theories or methods of logic are tools used in a certain social practice. Attention to the practices surrounding an object are important to understanding it. Since he viewed knowledge as participatory he argued that learning must come about by doing.
  • Metaphors provide us a way of understanding the world, by associating one thing with another. Powerful metaphors are like magic, and inform how we think of the objects described, revealing hidden aspects of the thing described. New metaphors for the forces in our lives will suggest new ways of living.
  • Metaphors interact with technology in several ways: technology serves as a source of metaphors, new technologies are understood metaphorically, and our metaphors in life pose problems to be solved technologically
  • By developing new metaphors, interface designers can suggest new ways of working with computers. If these metaphors are carefully chosen then they will provide a natural model which makes operation of the machine easy.
  • Just as metaphors can help us understand computers, computers can provide new metaphors for life. Postmodern theories of psychology suggest that there is no single unified โ€œegoโ€, but that each of us is made up of a multiplicity of parts, while Minsky discusses the โ€œagencies of mindโ€ in his book โ€œThe Society of Mind.โ€ Philip Bromberg claims that a healthy personality is one in which different aspects of the self can come to know one another and reflect upon each other.
  • This fluid multiplicity of personality is what gives us our flexibility and resilience.
  • Social networks allow participants to explore different aspects of their personality, to manufacture and evolve aspects of their personality depending on context and mood.
  • While some observers might see this activity as evidence of Heideggerโ€™s disaggregation of the subject by technology, it can also be seen as a model for Brombergโ€™s self as being one while being many. This is just one way in which computer technology, the internet, and connected social networks can show us a new way of understanding ourselves.
john sega

Online Threats and Dangers - 2 views

I downloaded an audio file from an unpopular website, when I opened it my computer crashed and since then, I have troubles turning it on because it would no longer display the correct desktop setti...

Desktop Computer Support

started by john sega on 11 May 11 no follow-up yet
alan ruslan

Mediacom cable - 0 views

  •  
    You will be able to find out the best information you really need about the cable that you use for your computer and also your television. We need mediacom cable to get the channels that we really need and it will be very awesome for you to check something that you really need a lot about the cable that you use for your computer and TV.
Om Nanotech Pvt Ltd

Computer DRAM Memory Module Manufacturer India Delhi/NCR - 0 views

  •  
    Om Nanotech, Computer DRAM memory module flash USB pen drive manufacturer, supplier, dealer, and exporter company in India Delhi/NCR. Buy, Best, computer, laptop, desktop,PC,SO-DIMM,LONG-DIMM,LODIMM,UBDIMM,Server RAM, brands are Dolgix,Windi,Qumem & OEM.
michol lasti

CCleaner 5.07.5261 Free For Download | librosdigitalescs software - 0 views

  •  
    CCleaner 5.07.5261 Free For Download - Piriform's CCleaner is a fast and simple to use program which are your computer more quickly- more secure plus much more reliable and CCleaner removes cookies and various other unused data that will clogs up your computer
michol lasti

Vmware Player 12.0.0 Free Download | librosdigitalescs software - 0 views

  •  
    Vmware Player 12.0.0 Free Download - A virtual machine can be a computer defined in computer software. It's like running a PC on your hard disk.
Mike Wesch

Zoho Creator - Anonymity Project - 0 views

  • What's to stop an online mass of anonymous but connected people from suddenly turning into a mean mob, just like masses of people have time and time again in the history of every human culture? It's amazing that details in the design of online software can bring out such varied potentials in human behavior. It's time to think about that power on a moral basis.
  • In this research, Durkheim's theory of the universalization of religious beliefs is extended to analyze the occurrence of religious rituals. Drawing upon Schutz's phenomenology of social relations, we amplify theoretically the Durkheimian perspective and suggest that the universalization process is stimulated by an increase in anonymity (as opposed to intimacy) in society. Structural factors consistent with anonymity--i.e., increasing population density, political and economic differentiation, and monetary exchange--are hypothesized to influence the universalization of ritual occurrence
  • In a rather wet community, members easily specify other members. This is effective for managing memberships and changing knowledge from tacit to formal. In a rather dry community, members barely identify with other members at all. This method is suitable for the formal-to-tacit phase of knowledge creation. Finally, it is discussed how social intelligence should be designed and what features are needed to support knowledge-creating communities.
  • ...6 more annotations...
  • Three studies examined the notion that computer-mediated communication (CMC) can be characterised by high levels of self-disclosure. In Study One, significantly higher levels of spontaneous self-disclosure were found in computer-mediated compared to face-to-face discussions. Study Two examined the role of visual anonymity in encouraging self-disclosure during CMC. Visually anonymous participants disclosed significantly more information about themselves than non-visually anonymous participants. In Study Three, private and public self-awareness were independently manipulated, using video-conferencing cameras and accountability cues, to create a 2 ร— 2 design public self-awareness (high and low)ร—private self-awareness (high and low). It was found that heightened private self-awareness, when combined with reduced public self-awareness, was associated with significantly higher levels of spontaneous self-disclosure during computer-mediated communication.
  • "The principle of anonymity has an immense spiritual significance. It reminds us that we are to place principles before personalities."
    • Mike Wesch
       
      citation: Alcoholics Anonymous 568
  • A laboratory experiment was used to evaluate the effects of anonymity and evaluative tone on computer-mediated groups using a group decision support system to perform an idea-generation task. Evaluative tone was manipulated through a confederate group member who entered supportive or critical comments into the automated brainstorming system. Groups working anonymously and with a critical confederate produced the greatest number of original solutions and overall comments, yet average solution quality per item and average solution rarity were not different across conditions. Identified groups working with a supportive confederate were the most satisfied and had the highest levels of perceived effectiveness, but produced the fewest original solutions and overall comments.
  • The results suggest that increased visual anonymity is not associatedwith greater self-disclosure, and the findings about the role of discursive anonymity aremixed.
  • Three levels of anonymity, visual anonymity, dissociation of real and online identities, and lack of identifiability, are thought to have different effects on various components of interpersonal motivation
  • suggesting that individuals in Western societies will gravitate toward online communities that allow lower levels of anonymity, while individuals in Eastern societies will be more likely to seek out online communities that promote higher levels of anonymity.
Mike Wesch

Media Revolution: Podcasting (Part 2); 2/06 - 0 views

  • By the end of 2004, bloggers were using the ability to add video as an enclosure to an RSS feed, allowing viewers to subscribe to videos and have them delivered automatically to their computers. This solved the problem of click and wait, where you had to wait for a video to start playing when you clicked on it from a web page.
  • podcasting (both video and audio) is a bottom-up movement and squarely the domain of individuals who are being guided by human creativity and expression, rather than corporate agendas and economic exigencies.
  • With the cost of video cameras in the hundreds, sophisticated computers with video editing software available for just over a grand, and high speed always-on internet connections costing less than the average cable television subscription, the means of both production and distribution are now in the hands of practically anyone with something to say
  • ...5 more annotations...
  • genuine conversation with their audience,
  • Marhshall McLuhan argued that in each socio-cultural era the medium in which information is created and transmitted determines the essential characteristics of that culture. He also predicted the evolution of an interconnected "global village".  The shift from a centralized media industry modeled on industrial revolution structures to a decentralized chaotic information-age soup is having a profound effect on the messages we exchange and shaping the characteristics of our culture. The global village comes to a crescendo with podcasting, and you can participate in the revolution with tools that are easily within reach: your imagination, the computer you're using to read this web page, and a video camera. We're not going to predicting what's next, as that's going to depend on what you, yes you, plan to do with new media. If the flutter of one butterfly wing, can trigger a chain reaction of events resulting in a storm half-way across the planet, imagine the effect millions, or billions, of individually produced videos will have on the characteristic of the global village and the media landscape.
  • You don't even need a video camera to start videoblogging, the mashup culture is in full force
  • most new computers come with free video editing software
  • A large group of vloggers, over 2,000 at last count, actively participate in the Yahoo! Videoblogging Group from all over the world.
Kevin Champion

Kevin Kelly -- The Technium - 0 views

  • In the case of the One Machine we should look for evidence of self-governance at the level of the greater cloud rather than at the component chip level. A very common cloud-level phenomenon is a DDoS attack. In a Distributed Denial of Service (DDoS) attack a vast hidden network of computers under the control of a master computer are awakened from their ordinary tasks and secretly assigned to "ping" (call) a particular target computer in mass in order to overwhelm it and take it offline. Some of these networks (called bot nets) may reach a million unsuspecting computers, so the effect of this distributed attack is quite substantial. From the individual level it is hard to detect the net, to pin down its command, and to stop it. DDoS attacks are so massive that they can disrupt traffic flows outside of the targeted routers - a consequence we might expect from an superorganism level event.
  • Unsurprisingly the vast flows of bits in the global internet exhibit periodic rhythms. Most of these are diurnal, and resemble a heartbeat. But perturbations of internet bit flows caused by massive traffic congestion can also be seen. Analysis of these "abnormal" events show great similarity to abnormal heart beats. They deviate from an "at rest" rhythms the same way that fluctuations of a diseased heart deviated from a healthy heart beat. Prediction: The One Machine has a low order of autonomy at present. If the superorganism hypothesis is correct in the next decade we should detect increased scale-invariant phenomenon, more cases of stabilizing feedback loops, and a more autonomous traffic management system.
  • 3) Perhaps 4chan is its face? Perhaps Anonymous speaks for the ii? Memes drift up out of the morass of /b/tards into the world, seemingly without a concrete source. โ€œI CAN HAZ CHEEZBURGERโ€ may be the global intelligence saying โ€œhiโ€โ€ฆ or perhaps more poetically, babbling like a baby. http://online.wsj.com/article/SB121564928060441097.html?mod=rss_E-Commerce/Media
  •  
    Kevin Kelly is an amazing theorist about technology and here outlines the potential of it creating a global superorganism. Section II about autonomy is very interesting in context and a commenter suggests that perhaps Anonymous is the emerging face of this autonomous superorganism. Very intriguining indeed, but do you buy it?
Mike Wesch

The New Atlantis ยป Is Stupid Making Us Google? - 0 views

  • โ€œas we come to rely on computers to mediate our understanding of the world, it is our own intelligence that flattens into artificial intelligence.โ€
  • what we are witnessing is not just an educational breakdown but a deformation of the very idea of intelligence.
  • Even those who have come to the Web late in life are not so very different, then, from the fifth-graders who, as an elementary school principal told Bauerlein, proceed as follows when they are assigned a research project: โ€œgo to Google, type keywords, download three relevant sites, cut and paste passages into a new document, add transitions of their own, print it up, and turn it in.โ€
  • ...11 more annotations...
  • even those who are most gung-ho about new ways of learning probably tend to cling to a belief that education has, or ought to have, at least something to do with making things lodge in the minds of studentsโ€”this even though the disparagement of the role of memory in education by professional educators now goes back at least three generations, long before computers were ever thought of as educational tools.
  • adapting its understanding of what education is to the new realities of how the new generation of โ€œnetizensโ€ actually learn (and donโ€™t learn) rather than trying to adapt the kids to unchanging standards of scholarship and learning.
  • โ€œlower-order skillsโ€ in comparison with the spatial, information-gathering, and pattern-recognition skills fostered by hours at the computer screen
  • canโ€™t imagine a mathematician saying the same thing about math, or a biologist about biology, yet, sad to say, scholars, journalists, and other guardians of culture accept the deterioration of their province without much regret.
  • humanities stopped being, or even wanting to be, โ€œguardians of cultureโ€ a long time ago.
  • In other words, the โ€œmentorsโ€ have not only betrayed their pupils, they have denounced the very idea of mentorship in anything but the tools of deconstruction which allow them to set themselves up as superior toโ€”rather than the humble acolytes ofโ€”the culture they study.
  • redefining education as the acquisition of information-retrieval skills
  • No one has ever taught them that books can be read for pleasure or enlightenmentโ€”or for any other purpose than to be exposed as the coded rationalization for the illegitimate powers of the ruling classes that they really are
  • But while Bauerlein takes Johnson to task on several points, he seems to suggest that all our educators have to do is expose their charges to some superior alternative to โ€œthe ordinary stuff of youth cultureโ€
  • โ€œYoung people,โ€ he rightly notes, โ€œneed mentors not to go with the youth flow, but to stand staunchly against it, to represent something smarter and finer than the cacophony of social life.โ€ Heโ€™s also right that they need more time away from the computer in order to acquire the skills of โ€œdeep readingโ€ recommended by Nicholas Carr.
  • But they are not likely to get either one so long as so many educators cling as they do now to the axiomatic belief not just that โ€œlearning can be funโ€ but that it must be fun, and the equally axiomatic rejection of that which may cause pain and humiliation, even if these are productive of real learning
    • Kevin Champion
       
      Well, learning certainly is fun! The process of learning can often times be difficult, terrifying, exciting, depressing, saddening etc. What's interesting is that there is no mention of relevance here. Learning is not always fun, but I think it is always fun when it is relevant. It also seems that the subjective experience of learning only occurs when it is fun. It doesn't feel like learning to me unless it is relevant to me; if it is relevant to me, it is fun! By extension, perhaps we benefit from thinking about learning from both subjective and objective perspectives, including both singular and collective objects (learning of an individual subjectively and objectively + learning of a group subjectively and objectively).
michol lasti

FileZilla Version 3.8.1 RC1 Free Download | librosdigitalescs software - 0 views

  •  
    FileZilla Version 3.8.1 is definitely an application program that's useful for circle file transfers by using FTP protocol inside computer networks or the internet. Latest version in this program is FileZilla 3. 8. 1. This software created and manufactured by Tim Kosse. This software provides a protocol for the exchange of files in a very network that can handle IP/TCP protocol, And by FTP you can move the files to server computer or maybe vice versa.
1 - 20 of 118 Next › Last »
Showing 20 items per page