...E-Learning: Emergence of the Profession Jason Drysdale, Jackie Flynt, and Shauna Hannon-Johnson 24 July 2011 The e-learning profession has grown leaps and bounds over the past two decades. Despite being slow to take hold, e-learning is now rapidly increasing in universities: “Today, almost all institutions of higher education offer some form of distance teaching and learning in the U.S.” (Saba, 2008). The historical timelines of instructional design and technology (ID&T) and distance education inform practices in place today. In this paper we track the development of these two traditions, each of which has contributed to current e-learning practice. Instructional Design and Technology: Parent Field Instructional design and technology (ID&T) is the term Robert Reiser (2001) uses for the field also known as instructional design, instructional technology, and educational technology. The core of ID&T revolves around two related practices: use of media for instruction and use of systematic design processes—known as instructional design or instructional systems design (ISD) (Reiser, 2001). We briefly trace below the development of these two strands of the field. Instructional media has been used since the early 1900s in school museums with movable exhibits. These museums appeared first in St. Louis in 1905, primarily using visual media such as photos and slides. This was known as the visual education movement. Movies were used, as per Thomas Edison’s expectation, beginning in 1910...
Words: 5883 - Pages: 24
...Cloud Computing Tutorial CLOUD COMPUTINGTUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Cloud Computing Tutorial Cloud Computing provides us a means by which we can access the applications as utilities, over the internet. It allows us to create, configure, and customize the business applications online. This tutorial will take you through a step-by-step approach while learning Cloud Computing concepts. Audience This reference has been prepared for the beginners to help them to understand the basic-to-advanced concepts related to Cloud Computing. This tutorial will give you enough understanding on Cloud Computing concepts from where you can take yourself to a higher level of expertise. Prerequisites Before proceeding with this tutorial, you should have basic knowledge of Computers, Internet, Database and Networking concepts. Such basic knowledge will help you in understanding the Cloud Computing concepts and move fast on the learning track. Copyright & Disclaimer Notice All the content and graphics on this tutorial are the property of tutorialspoint.com. Any content from tutorialspoint.com or this tutorial may not be redistributed or reproduced in any way, shape, or form without the written permission of tutorialspoint.com. Failure to do so is a violation of copyright laws. This tutorial may contain inaccuracies or errors and tutorialspoint provides no guarantee regarding the accuracy of the site or its...
Words: 9938 - Pages: 40
...playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery. Mobile devices can be seen as entry points and interface of cloud online services. Mobile devices (e.g., smartphone, tablet pcs, etc.) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc.), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce and industry fields. However, with mobility come its inherent problems such as resource scarceness, finite energy and low connectivity. Real time applications demand high levels of responsiveness, which in turn, demand intensive computing resources. Some mobile applications, such as location based social networking, process and make use of the phone’s various sensor data which is expensive in...
Words: 5635 - Pages: 23
...Cloud Computing for Education and Learning: Education and Learning as a Service (ELaaS) Mohssen M. Alabbadi Computer Research Institute (CRI) King Abdulaziz City for Science & Technology (KACST) Riyadh, Saudi Arabia Alabbadi@kacst.edu.sa Abstract—Cloud computing, despite its hype, is being widely deployed, with its dynamic scalability and usage of virtualized resources, in many organizations for several applications. It is envisioned that, in the near future, cloud computing will have a significant impact on the educational and learning environment, enabling their own users (i.e., learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the use of cloud computing in the educational and learning arena, to be called ‟Education and Learning as a Service” (ELaaS), emphasizing its possible benefits and offerings. It is essential for an educational and learning organization, with its budget restrictions and sustainability challenges, to use the cloud formation best suited for a particular IT activity. The Jericho Forum proposes a cloud computing formation model, called the Cloud Cube Model (CCM), which is based on 4 criteria. To preserve the symmetry of the cube, a new cloud computing formation model, called the Complete Cloud Computing Formations (C3F), is proposed. The IT activities in the educational and learning organizations are...
Words: 5560 - Pages: 23
...APU | Dissertationn | | Creating a framework for converting traditional Training system to E-training based on cloud computing in the IRAN Contents 1 Introduction 3 1.1 Problem background 4 1.2 Research question 5 1.3 General objective 5 Error! Bookmark not defined. 1.4 Intellectual challenge 6 1.5 Research program 6 1.6 Summary 7 * Figure 1 E-training requirement 10 Figure 2 pull and push model 13 Figure 3Pull model of E-learning (Asma, 2010) 2 13 Figure 4Khan’s E-learning Frame work 15 Figure 5Advanced Distributed Learning 1 17 Figure 66 multiple perspectives on cloud computing (Prentice, 2010) 19 Figure 7Cloud Computing Definition (Grace, 2010) 20 Figure 8cloud computing hard ware requirement 21 Figure 9Hardware devices (such as regular PCs, notebooks,) 22 Figure 10 SharePoint 2010 Collaboration 23 Introduction Nowadays technology has been changed many things in human life furthermore modified culture, social even communication feature of life in the world. The impact of technology also is obvious on today’s jobs and education world. Educational world has ended up greatly subject to new innovative learning and its needs for additional integral information are expanding step by step. (Timothy 2006 ). The new challenge appears in today’s economy. Increase competition Raising rivalry in a globalize business, contracting corporate assets, developing markets, quick moves in innovation, and the recruitment...
Words: 1574 - Pages: 7
...problem due to its voluminous amounts of data being streamed for their vehicles. I will go over how Volvo was able to integrate Cloud infrastructure into its networks, explain how they transformed their data into knowledge, identify the real-time information systems implemented and evaluate the impact of these implementations, and argue how the Big Data strategy gives Volvo a competitive edge. Volvo, which means “I roll” in Latin, got its start on April 14, 1927 by a gentleman named Jacob, in Gothenburg. Since then it has come a long way by integrating Cloud infrastructure into its networks. Cloud computing is defined by Turban and Volonino (2011) as computing “in which the technology is rented or leased on a regular or as-needed basis” (pg 32, para 3). One thing Volvo has done is to create Cloud Computing e-learning solutions for Arab and African countries in partnership with Allied Soft (Allied Soft, n.d.). This has allowed Volvo to open an Education Service Provider in order to allow students, teachers, and parents to access the e-learning software. Cloud computing has also allowed Volvo to as stated by Microsoft Case Studies (2011) “address its needs for a cost effective infrastructure that provided the ability to quickly scale up to handle a high volume of traffic and that would also serve a global audience with high performance” (para 10). Cloud also allows all their locations to have the software that is needed all at the same time and no one has to wait for techs to come...
Words: 763 - Pages: 4
...science-cloud computing [pic] cloud computing 2012-cloud computing cloud computing-year-2011 cloud computing-2 best-papers-EEE cloud computing data storage in cloud computing data-compression-in-cloud-computing Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallels to this concept can be drawn with the electricity grid, where end-users consume power without needing to understand the component devices or infrastructure required to provide the service. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on Internet protocols, and it typically involves provisioning of dynamically scalable and often virtualized resources It is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. This frequently takes the form of web-based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computers.[5] Typical cloud computing providers...
Words: 2157 - Pages: 9
...CLOUD COMPUTING Saas and Paas Cloud computing is a significant alternative in today’s educational perspective. The technology gives the students and teachers the opportunity to quickly access various application platforms and resources through the web pages on-demand. N.NGQAYANA 2851522 9/27/2012 TABLE OF CONTENT Abstract…………………………………………………………………..3 Introduction…………………………………………………………..3 Overview………………………………………………………………3 Universities Implement Cloud Computing……………..............4 Software as a Service (SaaS)……………………………………...6 Platform as a Service (PaaS)………………………………………6 IBM cloud computing……………………………………………….7 Advantages…………………………………………………….8 Disadvantage: Unused resources……………………………………..9 Disadvantage: Interoperability issues………………………………..9 Challenges of cloud computing…………………………………………………………10 Security concerns………………………………………………………..10.1 Disaster recovery………………………………………………………..10.2 Data protection……………………………………………………………10.3 Examples and Experiences OF Universities and IBM …………11 Why Cloud Computing is Important for Business……………..11 Conclusion……………………………………………………………..13 References……………………………………………………………..14 Abstract Cloud computing is a significant alternative in today’s educational perspective. The technology gives the students and teachers the opportunity to quickly access various application platforms and resources through the web pages on-demand. Unfortunately, not all educational institutions often...
Words: 4394 - Pages: 18
...|RESEARCH PROPOSAL | |On | |CLOUD COMPUTING AND SECUTITY | |Submitted | |for Ph.D. Approval | | | | | |By Mr. MBANZABUGABO Jean Baptiste(BE,MSSE,MCA) | TABLE OF CONTENTS ABSTRACT..................................................................................................3 1. INTRODUCTION........................................................................................4 1. GENERAL OBJECTIVE OF THE STUDY.................................................................................................. 5 2. SPECIFIC OBJECTIVES .......................................................................5 2. LITERATURE REVIEW ...........................................................................6 3. METHODOLOGY...
Words: 6240 - Pages: 25
...Create a Cloud based resource for Managing Students and Tutoring Resources Create a Cloud based resource for Managing Students and Tutoring Resources Managerial Applications of Information Technology DeVry University, Keller Graduate School of Management September 15, 2013 1|Page Create a Cloud based resource for Managing Students and Tutoring Resources Table of Contents Topic……………………………………………………………………………………………………………………………… 3 Business Problem Statement…………………………………………………………………………………………..3 Name of Company…………………………………………………………………………………………………………….3 Brief Description of Proposed Solution……………………………………………………………………………..4 General Benefits……………………………………………………………………………………………………………….4 Audience…………………………………………………………………………………………………………………………..4 2|Page Create a Cloud based resource for Managing Students and Tutoring Resources Proposal Topic: This proposal discusses the reengineering of the business model and processes of a tutoring company, to take it from a traditional business to an e-commerce business. Due to facility costs and maintenance, administrative costs, and costs of materials, the profit margin has been in steady decline, and financial forecasts show that the current business model can’t be sustained. This lack of use of technology, is stunting the growth of the company, and making inefficient use of time and resources to conduct efficient business operations. Business Problem: The business problems to be solved are how to improve operational efficiencies...
Words: 402 - Pages: 2
...Review 8 References 14 Research Skills 1. Research Proposal 2.1. Rationale and Context Cambridge City Government is an institution that is currently facing problems with the management of its information transfer over the internet. This is seen in the need to align data, particularly revenue streams, incomes and expenditures. In fact, the situation is worsened by an increasing city population, as well as amenities complexities that are placing a strain on the available internet facilities that serve the institution. As such, the proposed research study intends to analyse the role that cloud computing could play in solving the information transfer problems that face the government. The research results will act as the blueprint for the city administrators to develop and implement networking management approaches that will address its needs. I assume that if cloud computing is determined to be advantageous for the government, then its implementation will make it easier for the institution to meet its information management needs. This proposal describes the approach to research that will be adopted for the proposed study. Kenrick et al. (2010, pp. 293-294) argue that the cognitively driven constructs and context of any research would aid it in accepting the intellectual journey applied in the identification of the research problem. In this respect, it is better to understand the context of the research and the cognitively driven constructs that make up the search for...
Words: 3423 - Pages: 14
...Intrusion Detection System in Cloud Computing TOPICS * Introduction * What is IDS? * What is Cloud Computing? * Intrusion Detection System in Cloud Computing * Conclusion * References 1. Introduction Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. Therefore, in this term paper, I will emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. I propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Mine mechanism also integrates two techniques...
Words: 1673 - Pages: 7
...535 Cloud Computing Summer Semester Table of Contents I. Executive Summary II. Definition/History of Cloud Computing - III. Background of Cloud Computing IV. Infrastructure and Platform as a Service V. Types of Cloud Computing environments VI. Benefits of Cloud Computing I. Executive Summary This research paper address some of the issues surrounding cloud computing as a model for enabling convenient on demand network access to a shared pool of configuration computing resources (e.g. network, servers, storage, applications and services.) The term cloud computing means that customers do not own network resources such as hardware software systems or service; network resources are delivered over the Web. While both the hype and promise surrounding cloud computing continue to accelerate at a rapid pace, confusion still remains about what exactly cloud computing is the risk and benefits associated with transitioning to cloud base environment. Additionally, this paper examines the advantages of cloud computing as well as the different types of cloud computing. Lastly, this paper outlines recommendations of how organizations use cloud computing to controlling risk and cost effectiveness. II. History /Definition of Cloud Computing History There was a time when every household, town farm or village had its own water well. Today, shared public utilities give us access to clean water by simple turning on the tap; cloud computing...
Words: 2489 - Pages: 10
...Availability and Energy Consumption Analysis of Mobile Cloud Environments Danilo Oliveira∗ , Jean Araujo∗† , Rubens Matos∗ and Paulo Maciel∗ ∗ Informatics † Academic Center, Federal University of Pernambuco, Recife, Brazil Unit of Garanhuns, Federal Rural University of Pernambuco, Garanhuns, Brazil {dmo4, jcta, rsmj, prmm}@cin.ufpe.br∗ , jean@uag.ufrpe.br† The remainder of this paper is organized as follows. Section II provides an overview about mobile clouds and the analytical modeling for availability evaluation. The methodology adopted is presented in detail in Section III. Section IV presents the models developed to represent a mobile cloud system. A case study is described in Section V, with the results obtained through model analysis. Section VI concludes the paper, presenting also some possible future works. II. BACKGROUND Abstract—Mobile cloud computing refers to abstraction of computational power to outside of the mobile device, processed in the “clouds”. This paper provides an availability and energy consumption study using hierarchical heterogeneous modeling. Different scenarios were analyzed considering wireless communication technologies, such as 3G and WiFi. The results shows that the 3G protocol causes a lower availability and is the greater responsible for the discharge of battery, but when is combined with WiFi protocol providing communication redundancy, we have the best results of availability and better results of uninterrupted operation time of battery...
Words: 5125 - Pages: 21
...Cyber Crime Stacy Hendrix Grantham University Richard Sayles Introduction to Computer Crimes May 15, 2012 Cyber crime is the new breed of crime, which is either perpetrated using computers, or is otherwise related to the internet. Its origin can be traced to the growing dependence on computers in modern life in today’s society. Cyber crime has assumed criminal implications today as everything from microwave ovens and refrigerators to nuclear power plants is being run by or connected to computers. Today, the world is moving towards a point where everything from banking /stock exchanges, are traffic control, telephones to electric power, health care, welfare and education depends on software through the use of computers. This exponential growth; the increase in the capacity and accessibility of computers coupled with the decrease in cost, has brought about revolutionary changes in every aspect of human civilization, including criminal activity. The increased capacities of information systems today come at the cost of increased vu Inerrability. Information technology has become a production site for criminal opportunities of a variety that the brightest criminals of yore could not even begin to dream about. A cyber crime may be theft of valuable information services, communications in furtherance of criminal conspiracies, telecommunications piracy, electronic money laundering, electronic vandalism and terrorism, sales and investment...
Words: 1391 - Pages: 6