Thursday, January 27, 2011

Discussion 4: Second Life



Disruptive technologies occur when an innovative technology combines with an existing technology to revolutionize performance (Thornburg, 2010). Tynan (2008) suggests several powerful combinations including DVR plus On Demand, You Tube plus low-priced digital camcorders, and cell phones plus wireless internet. The iPad is another debatable disruptive technology. The iPad meets the criteria of disruptive technologies such as customer demand, new applications, and limited marketing research (Christensen, 1997; Laube, 2010). Disruptive technologies change existing conditions by impacting personal management, opinion, and achievement.

Another powerful example of a disruptive technology is Second Life. According to Rosedale, (2008) people will eventually prefer virtual characters rather than their real identities. Revolutionizing social interaction and communication contributes to the debate of Second Life as a disruptive technology. This web application obsoletes previous methods of instant messaging and advances emotional involvement with personalized avatars. As a relatively new experience, Second Life will dominate web communication for many years until an advanced holographic virtual community revolutionizes human interaction predicted for 2025 (Elon University/Pew Internet Project, n.d.). Social benefits related to virtual worlds include understanding culturally diverse experiences and freely collaborating with many users (Rosedale, 2008). As interest builds, more people will immerse themselves in the virtual world to escape physical and emotional barriers. By combining the human desire to communicate with innovative virtual technology, Second Life extends existence into the imagination.

Regarding education, Second Life exploits student engagement to enhance interaction with information. The virtual world provides an authentic learning environment including interaction with experts and feedback from peers (Gronstedt, 2008). The virtual world presents obvious challenges including bullying and cynical or faulty information. Yet, Second Life applies content in authentic situations, engages multiple intelligences and learning styles, and enables expression (harveyd, 2011). The ability to discuss ideas with peers in an imaginative environment would promote knowledge transfer as students engage within a collaborative and realistic environment.
References

Christensen, C. (1997). Notes on the innovator’s dilemma: When new technologies cause great firms to fall. Retrieved from http://www.2ndbn5thmar.com/change/The%20Innovators.pdf

Elon University/Pew Internet Project. (n.d.). Imagining the Internet: A history and forecast: Forward 150 timeline. Retrieved from http://www.elon.edu/e eb/predictions/forward150years.pdf

Gronstedt, A. (2008). Be first in second life. Training, 29-30. Retrieved from http://www.gronstedtgroup.com/pdf/Training_Mag_article_virtual_world_fall_08.pdf

harveyd. (2011, January 17). Second Life: Rita Mulholland [Web log comment]. Retrieved from
http://wp.stockton.edu/asde/2011/01/17/second-life-rita-mulholland/

Laube, S. (2010, March 3). Is the iPad a disruptive technology? [Web log comment]. Retrieved from http://pwcinnovate.wordpress.com/2010/03/03/is-the-ipad-a-disruptive-technology/

Tynan, D. (2008). The 10 most disruptive technology combinations [Web log comment]. Retrieved from
http://www.pcworld.com/article/143474-10_most_disruptive_technology_combinations.html

Tuesday, January 11, 2011

Module 3 Blog: Rhymes of History


Throughout history, storytelling is the foundation for cultural heritage, teaching, and entertainment. From oral, paintings, text, projectors slides, and video versions, storytelling shapes civilization and records the biography of humanity. Today, storytelling continues to impact past, present, and future. Yet, the nature of storytelling has adapted to the digital age through video production software and online slideshow presentations.

Animoto, a cloud computing customer, represents modern storytelling. This free web application allows users to create a digital story using images, video, and sound. Additionally, users can easily upload presentations to the web or embed in social networking sites (Dick, 2011). The many uses for these online stories include sharing classroom performance, marketing, and communication with family and friends. Passing down traditions and memoirs no longer require synchronous meetings. With the web, telling a story that reaches around the globe takes only a few minutes of editing on an online platform.




A key concern regarding Animoto involves user protection as cloud computing faces the challenge of information security threats (Hanna, 2009). This notion rekindles another recurring theme in history . . . homeland security. What models and resources will emerge to reduce threats to user data and applications? Currently, experts suggests knowing where data is located, testing security, backup information, and only use programs referred by reliable sources (admin in Cloud Hosting, 2011).

Kelly’s video (2007) reveals the impact of the web on the future of humanity by explaining the embodiment, re-structuring, and co-dependency of humankind based on this “one machine.” The notion that the web embodies the material world and leads to complete co-dependency rekindles the idea of totalitarianism. Without battling religious arguments, the idea that everything regarding personal existence will connect to this one machine relates to the complete control and dictatorship of society. Maybe my idea seems extreme. However, thinking in terms of the future, to say that the web will personify existence provokes a feeling of uneasiness as humankind has always been an exclusive group and condition. Now, it seems as though we will become a new kind by uniting with an all-encompassing object that has yet to develop a name and surpass human processing.

References

admin in Cloud Hosting. (2011, Janurary 9). 5 Tips for cloud computing security [Web log comment]. Retrieved from http://webhostingblog.us/2011/01/5-tips-for-cloud-computing-security/

Dick, J. (2011, January 3). Tool review: Animoto [Web log comment]. Retrieved from http://newlearninginstitute.blogspot.com/2011/01/tool-review-animoto.html

Hanna, S. (2009). Cloud computing: Finding the silver lining. Retrieved from http://www.ists.dartmouth.edu/docs/HannaCloudComputingv2.pdf

Kelly, K. (2007, December). The next 5,000 days of the Web [Speech]. Speech delivered at the EG 2007 Conference, Los Angeles. Retrieved from http://www.ted.com/index.php/talks/kevin_kelly_on_the_next_5_000_days_of_the_web.html

Krypteia. (2007, August 6). Animoto promo [Vodcast]. Retrieved from http://www.youtube.com/watch?v=dvjRzaUYoLw