Technology Issues: Cell Phone Effects

Introduction

Technological advancements have brought many changes in the modern world. According to Ling (56), technology has greatly changed the way various activities are undertaken. One aspect that has undergone significant changes is the mode of information transfer. Initially, people wrote letters in case of a need to pass information to another person, or use messengers to deliver such information later. This area has continued to advance, and currently there are very many ways of passing information from one person or place to another.

The most common means of communication in the modern society are Facebook, Twitter, cell phones and many others. Through these modes, people are able to share ideas and information from different corners of the world. Among all these means of communication, the most reliable and convenient one is a cell phone. Through cell phones, people are able to pass and receive information at any time, and in any part of the world.

Cell phones have many benefits to the users. These users include business people, government officials, and all individuals who use the cell phones for one reason or another. Several arguments have been raised concerning the dangers of cell phones to social health. Some of these arguments may be true or false depending on the validity of the studies undertaken.

It is, however, important to have the correct information on the relationship between the use of cell phones and personal health. My claim is that cell phones have no impact on peoples health because it is supported by a number of researches, in particular on the psychological influence of cell phones on pregnant women and the role of cell phones to play in the development of cancer cells.

Criteria-Match Arguments

The issue of cell phones and health has raised a lot of concern from many scholars. As a result, many researchers have come up with several arguments on the health issues related to cell phone use. In this section, some of the arguments of the researchers will be analyzed.

The argument of Glotz (65) claims that cell phone radiation causes deadly diseases like brain tumor, breast cancer, traffic accidents, and some behavioral change in pregnant women. This case claims that there is a link between the use of cell phones and human health. However, it does not meet the criterion of a standard scientific research because their hypotheses were not empirically tested.

The second case is about the findings by Richard S Ling. The research was done in Cambridge University, and it showed that the cell phones have a serious negative effect on the reproductive system of men, and caution should be taken when using it. This scholar argues that cell phones have been found to reduce the number and quality of sperms in males. Thus, the use of cell phones can be claimed as the main cause of low fertility rates among men today.

Ling (84) also points out that apart from causing cancers; cell phones have been identified as the main cause of traffic accidents among the users. This researcher further explains that in most of the developed countries like the United States, cell phones led to poor performance in schools.

This is so because young learners in such countries are allowed to use cell phones in schools, which makes them spend a lot of their time on mobile phones rather than spending the time with their books resulting in the low performance. Although I do not agree with his first argument on the effect of mobile phones on mens fertility, I think the argument about accidents has some truth in it. I believe that this case meets the criteria on what a valid social research should entail.

The third case was based on the arguments made by Horst and Miller (23) that there is a close relationship between the use of mobile phones and breast cancer, especially among lactating women. These scholars developed a hypothesis that closely relates to increase in the number of breast cancer cases to the increasing use of phones, in particular chances of getting breast cancer in women. This case does not meet the criterion because the argument was not based on a scientific research, but a general believe that has not been tested empirically.

Response to My Objections

In the three cases presented above, I make a concession in one, but refute the other two. I believe that some of the arguments that associate the use of mobile phone to various health problems are not genuine. I disagree with the arguments of Ling that relates the use of mobile phones to low productivity in men.

This argument is not good because it fails to meet the standards of a scientific research. An independent research by Hales (65) explains that the number of cancer cases has not changed, but it has remained the same as it was before cell phones invention. This research report is good because it meets the requirement of a phenomenological study that embraces close comparison of incidents when deriving a conclusion. This is a clear indication that there is no relationship between cell phone use and cancer as many researchers are claiming.

The opinion that the cell phones have a carcinogenic effect may be true, but there is no valid study to support this argument. Burgess (51) argues that the microwave radiation emitted by cell phones is too weak to affect the DNA structure. This research is good because it is a scientific investigation that meets the criteria for an empirical study. It supports my argument that cell phones have no carcinogenic effects.

This also explains why cell phones cannot be said to have an effect on the quantity and quality of sperms in males as many researchers prove. If there are any such related effects of cell phones, than those results are long term, and are yet to be reported but as per the current state, such effects do not hold any ground.

The only impact of cell phones that I may support is that, its use has some relationship with road accidents. It is true that when using a cell phone, drivers attention may be directed to the phone, and this may result into an accident. This also applies to the pedestrians who use cell phones while crossing or walking along the road.

Conclusion

Cell phones have many benefits and their importance to the users should not be corrupted by invalid arguments that they are dangerous to health. Since there is no valid research to support this negative argument of some scholars, the users should not be misled by the information that cell phones have negative effects on their health, unless proven otherwise. Researchers should come up with valid empirical research to support their claims.

Works Cited

Burgess, Adam. Cellular Phones, Public Fears, and a Culture of Precaution. Cambridge: Cambridge University Press, 2004. Print.

Glotz, Peter. Thumb Culture: The Meaning of Mobile Phones for Society. Bielefeld: Transcript, 2005. Print.

Hales, Dianne. An Invitation to Health. Belmont: Wadsworth Cengage Learning, 2010. Print.

Horst, Heather A and Daniel Miller. The Cell Phone: An Anthropology of Communication. New York: Berg, 2006. Print.

Ling, Richard S. The Mobile Connection: The Cell Phones Impact on Society. San Francisco: Morgan Kaufmann, 2004. Print.

Information Technology: Peer-to-Peer Computing

Abstract

Peer-to-peer (P2P) computing entails computer platforms that rely on various dispersed computer components to operate in decentralized ways. It simply means the sharing of computer platforms and data. Organizations have pervasively deployed computers across their different business units. Consequently, P2P computing has gained significant attention in research, product development and usages in organizations.

Many organizations have preferred P2P models because of their benefits such as enhancing scalability, reducing dependency on a centralized system, reducing costs through direct communication among systems and improving resource aggregation and functionality.

This paper presents concepts of P2P systems and functions. It highlights the fundamental concepts and critical aspects of the model. In addition, the paper provides a general approach to models used in P2P. It will help readers understand the possible advantages of deploying P2P computing in organizations. Moreover, people unfamiliar with P2P concepts will get a general overview of this research.

Introduction

Milojicic et al. defined peer-to-peer computing as a class of systems and applications that employ distributed resources to perform a function in a decentralized manner (p. 1). The fundamental aspect of peer-to-peer (P2P) computing is the sharing of computer resources through exchange platforms.

Users can use computers to distribute critical roles such as content sharing, platforms, data and communication platforms among others (Li 45). The P2P model relies on decentralization of algorithms and data, but some core functions, systems, and platforms can be controlled from a central location. The normal P2P systems have been based on the Internet or ad-hoc networks (Milojicic et al. 2).

Capabilities of P2P Computing

Many users have preferred P2P computing because of the following reasons. First, P2P computing enhances valuable externalities by combining different resources through low-cost systems to deliver high performance. That is, the outcomes perform better than single components. Second, P2P computing results into low-cost of ownership. The model promotes cost sharing by using the available infrastructures.

In addition, costs associated with maintenance are significantly reduced or distributed. Third, P2P computing can enhance anonymity in an organization and give users more control over their data and system applications. Fourth, the use of P2P computing results in system dynamism. Dynamism shows that computer nodes and other systems can run continuously in a dynamic environment. P2P models have been effective in such dynamic environments because they can accommodate various users and adapt to changing usages.

However, users must ensure continuity or security of their functions or computation jobs when other users take the system. Finally, P2P computing promotes ad hoc communication and collaboration among users. In this regard, ad hoc environments offer flexibility because users can come and go based on their locations, roles, and interests. This capability enhances the dynamism concept of P2P models because the system can support such changes.

P2P computing systems generally do not use any established computer infrastructures. Instead, they use logical overlay based on CAN and PAST or reside on the edge of the Internet or in ad-hoc networks (Milojicic et al. 2).

However, P2P has raised critical issues of network security for users. In addition, IT departments have also raised concerns on accountability. While the previous P2P models had some levels of concerns, current hybrid models have enhanced performance relative to pure unstructured networks. Nevertheless, technologies in P2P have continued to evolve and users can determine their benefits and hypes.

Architecture

The P2P networking is based on the concept of similar peer nodes that can run as a server and a client at the same time for other nodes within a network (Vu, Lupu and Ooi 171). The P2P networking model is completely different from the client-server networking computing (Vu et al. 171).

In the client-server model, a central server acts as the main point for both from and to communications. For instance, the File Transfer Protocol (FTP) is an example of a client-server networking model. The client must start the transfer process and the server handles the request.

Unstructured networks

P2P computing uses an unstructured network based on the ad hoc connection. The unstructured P2P networks do not require any specific network structure models based on the design (Stallings 89). In this case, nodes are responsible for creating random connections among themselves. Kazaa and Gossip are examples of unstructured P2P networks.

Generally, unstructured P2P networks do not require any specific standards. As a result, P2P unstructured networks are simple to develop and enhance local network performance on various areas of the overlay. In addition, all peers within the network have similar functions. This capability makes the system highly robust when facing increased churn i.e. when many peers join and leave the network at higher rates.

The major drawback of the P2P unstructured network originates from a lack of a structure. Specifically, it is difficult for peers to find certain contents fast. Consequently, they hit the network with several search queries in order to locate peers that contain the required information. Network flooding results in traffic and high bandwidth and more CPU memory usages because all peers must perform the search. Nevertheless, there is no guarantee that peers will resolve all the users search queries.

Still, unstructured P2P network does not provide any correlation among peers or content management. Moreover, flooding searches may fail to locate a peer with the required data. Popular content can be available to almost all peers. On the other hand, rare data could be difficult to find because they are only available for few users within the network and thus it could be difficult for flooding to be successful (Shen, Yu, Buford and Akon 118).

Structured networks

The P2P network is based on specific topology in the structured system. Nodes can efficiently locate extremely rare files within the network. A distributed hash table (DHT) has been the most common P2P network model. It involves the use of an alternative consistent hashing to allocate rights of every file to a given peer (Trunfio 837).

Therefore, peers can conduct queries on the network by relying on hash table (key, value) located within the DHT and in any node that can take part in the search and provide the required value linked to a specific key (Trunfio 837). Nodes within the network must have lists of nearest nodes that meet certain criteria when routing traffic to improve the effectiveness of the network. This implies that structured P2P networks are not efficient in situations of rapid churn.

A recent assessment of the P2P platforms subjected to real workloads identified several challenges related to DHT-based solutions. These included high costs of resources and resource discovery and load imbalance (Bandara and Jayasumana 634).

Consequently, Bandara and Jayasumana concluded that real-world queries are relatively easier to resolve using unstructured, super peer and single-attribute dominated query based structured P2P solutions (634). This implies that many current designs used can only operate under certain specific conditions and their performances normally deteriorate when subjected to realistic workloads.

Hybrid models

In P2P networks, hybrid models consist of both peer-to-peer and client-server computing approaches (Vu et al. 171). The most widespread hybrid model consists of a central server that assists peers to locate other peers within the network ( Shen et al. 118). Many hybrid models exist, but they all apply the centralized functionality approach supported by the structured server or client network and use the node provided by the pure peer-to-peer unstructured networks.

Hybrid models perform better relative to pure unstructured and pure structured networks. Hybrid models have enhanced search functions because of centralized capabilities. In addition, they also leverage the decentralized combination of nodes found in the unstructured networks.

Peer-to-Peer Computing Models

Farago-Walker identified three distinct P2P computing models as multiple peer relationship, distributed peer relationship and collaborative peer relationship (p. 1). In a multiple peer relationship, computers are networked to each other via servers (Farago-Walker 1). Users can share or gather files from other users within the network. One major challenge with a multiple peer relationship is security. The system is prone to security breaches, and it could result in intellectual property challenges.

In a distributed peer relationship, many computers are networked to enhance their processing and computing capabilities. Enhanced capabilities increase Internet activities and tackle complex issues that require massive processing speed and reliability. Finally, in a collaborative peer relationship, a small number of users agree to work together through a common user interface such as online tools, platforms, chat, messaging platforms or even e-learning tools.

Decentralization

Decentralization is a major feature of peer-to-peer computing. It influences the design of applications and systems. In this regard, a system developer must account for security, data structure, algorithms, system scalability, and availability, as well as users interaction (Milojicic et al. 20). For instance, participants may understand that other users are remotely located and may disengage. Hence, they must work by maximizing strategies of decentralized systems.

Distributed P2P systems must account for the decentralization and collaboration needed for diverse users, authorization, central control and data management (Silberschatz, Galvin and Gagne 741).

The ad hoc approach for P2P applications also influences system development. Users perception of the system is critical in ad hoc environments. Users can disappear at any time and this affects how the system is designed.

Security issues have remained major obstacles in P2P computing. In addition, anonymity could also be an important factor in certain locations and applications. Nevertheless, the system scalability, enhanced performance, resilience and interoperability (Milojicic et al. 20) have demonstrated the relevance of P2P computing in distributed systems.

P2P computing promotes content sharing. This ensures data availability to various communities of users. Hence, data security and system performance are paramount for many users. At the same, users also want the ease of use and anonymity in P2P computing.

P2P Markets

Different market segments have shown interests in P2P computing. There are individual consumers who use P2P computing for personal reasons (Farago-Walker 3). Napster has popularized the use of P2P in music sharing.

There are also organizations such as financial, biotech firms and other B2B that require P2P computing. Data Synapse uses P2P computing. There is a public class of users for P2P computing. They focus on information sharing and digitalization of contents.

Significance of Peer-to-Peer Computing

P2P computing is based on the concept of a widely connected world of computers. Hence, users do not have to rely on a central system to process their requests. P2P computing shows how administrators and users can leverage several available computing resources, power, storage capabilities, and connectivity to enhance system distribution.

P2P computing has transformed data sharing and communication. Today, users can share large files instantly and get immediate feedback and reduced costs of communication.

This computing model has changed collaboration among communities of users. For instance, it has eliminated physical contacts between people and facilitated collaboration among groups in widely dispersed locations. Users can collect and distribute their contributions via the system for further evaluation and additional suggestions. In other words, distance is no longer a challenge among communities of users.

However, collaboration is necessary for users to realize the effectiveness of P2P computing. Users must learn the technical aspects of P2P computing in order to collaborate and communicate. Collaboration among communities of users is critical for the development of P2P computing models. P2P computing can only achieve its maximum potential when significantly higher numbers of nodes are connected and have resources for distribution.

Currently, the common practices with P2P computing networks have not encouraged other users to contribute. While some users rely on resources available in other nodes, they have failed to contribute their own resources. This is a freeloader problem in the network system. Freeloading has affected the system significantly and has rendered some sites irrelevant.

Some P2P networks such as Freenet have focused on user privacy. They ensure that contents are protected and users identities and locations remain private within the network (Vu, et al. 179).

P2P systems have demonstrated a significant challenge to network neutrality disputes. Many Internet service providers (ISPs) do not want P2P systems because of the high bandwidth usages associated with these computing models. Relative to other applications such as Web browsing, sending e-mails and sharing other small files, P2P file sharing is a daunting task because of heavy bandwidth required to distribute large files to communities of users. It causes flooding in the system.

Current research

Previously, researchers had found commercial applications of P2P computing for individuals, enterprises and the public. Currently, they have embarked on computer simulations to enhance comprehension and assessment of multifaceted user characteristics when using interacting with others. Networking research must result in valid and reliable outcomes that can initiate further research.

Conclusion

P2P computing shows classes of computer systems that depend on distribution to leverage available network resources for content sharing among communities of users. Many users prefer P2P computing because of scalability, interoperability, fault resilience, distributed costs and availability among other benefits. However, system security and vulnerability are major challenges to P2P networks. In addition, a lack of collaboration among communities of users has resulted in the collapse of some sites.

Overall, peer-to-peer computing has become critical for users who want to connect directly to each other without relying on a central server. Consequently, it has transformed information sharing across the Internet and enhanced collaboration among communities of users. This computing model provides greater control to users and thus outcomes could be extremely uncertain.

Works Cited

Bandara, Dilum and Anura Jayasumana. Evaluation of P2P Resource Discovery Architectures Using Real-Life Multi-Attribute Resource and Query Characteristics. 2012 IEEE Consumer Communications and Networking Conference (CCNC). Las Vegas, NV: IEEE Communications Society, 2012. 634  639. Print.

Farago-Walker, Susan. Peer-to-Peer Computing: Overview, Significance and Impact, E- learning, and Future Trends. n.d. Web. 28 Oct. 2014.

Li, Jin. On peer-to-peer (P2P) content delivery. Peer-to-Peer Networking and Applications 1.1 (2008): 4563. Print.

Milojicic, Dejan, Vana Kalogeraki, Rajan Lukose, Kiran Nagaraja, Jim Pruyne, Bruno Richard, Sami Rollins and Zhichen Xu.. Peer-to-Peer Computing. Santa Barbara, CA: Hewlett- Packard Company, 2002. Print.

Shen, Xuemin, Heather Yu, John Buford and Mursalin Akon. Handbook of Peer-to-Peer Networking. New York: Springer, 2009. Print.

Silberschatz, Avi, Peter Baer Galvin and Greg Gagne. Operating System Concepts: With Java. 9th ed. New York: John Wiley & Sons, Inc., 2012. Print.

Stallings, William. Operating Systems: Internals and Design Principles. 5th ed. Upper Saddle River, NJ: Prentice Hall, 2005. Print.

Trunfio, Paolo. Peer-to-Peer resource discovery in Grids: Models and systems. Future Generation Computer Systems 23.7 (2007): 837. Print.

Vu, Quang, Mihai Lupu and Beng Ooi. Peer-to-Peer Computing: Principles and Applications. New York: Springer, 2010. Print

Stakes International Information Technology Project

Project statement and goals

Stakes International is developing an intranet-based dashboard that will assist the management to place queries to the firms database and receiving information such as the current financial status of the firm, the status of development projects as well as the network and server infrastructure. This has been occasioned by the fact that the management has in the past experienced delayed decision-making because of a lack of timely information. This has resulted in delayed processing as well as dissatisfied customers as Stakes International operates at under capacity. It has been envisaged that with these processes being streamlined through the introduction of the intranet dashboard, Stakes International will generate up to 1.2 million US dollars from its business.

The initial feasibility study was conducted using interviews. The Team metro carrying out the project for Stakes International carried out the initial training and orientation and derived the necessary interview materials in form of questionnaires. The general structure of the questionnaires was balanced including both open and closed questions.

All projects initiated must have a goal (Schwalbe, 2005). The goal of this project is to implement an intranet-based dashboard that will provide an interface giving the management current status reporting function concerning a number of factors such as the network and server infrastructure, the financial and project development statuses. The Team metro that is handling this project is so far enthusiastic concerning the progress. The project is expected to proceed expediently resulting in the long-term sustainability of the processes carried out at Stakes International.

Performance Objectives

A successful project management discipline will ensure that a set of performance objectives are in place upon which the projects progress can be measured (Rioux, 2008).

The introduction of the intranet-based dashboard is expected:

  1. To improve Stakes managerial monitoring process and improve their decision making. Status reports have been taking a month to compile can now be compiled biweekly. The delay was as a result of limited data communication services and system inefficiency. The intranet based dashboard is expected to reinstate the frequency of reporting to biweekly thereby helping the management make timely decisions as regards network and server infrastructure, financial and project development statuses.
  2. To centrally avail project management status data and information in real time mode. Initially this data has been delayed and would be available only after three days. The intranet based dashboard will ensure that the data is now available instantaneously enabling the management to make decisions on how shared working can be facilitated so that deadlines are effectively met.

The monetary organizational value of the intranet based dashboard

Part of project management discipline is to evaluate the return on investment also called the monetary organizational value (Marchewka, 2009). Stakes International currently handles business estimated at 800,000 US dollars annually. Part of this amount to a tune of 125,000 US dollars has been set apart by the management for the development of this project plus a further 50,000 US dollars for contingency funding towards the project. When the intranet dashboard is finally operational, Stakes International expects to meet deadlines more effectively which in turn is likely to increase their annual income to 1.2 million US dollars. The measurable organizational value for the intranet based dashboard application is projected at 225,000 US dollars which is 128.6%. MOV Calculations:

(Total annual income after system implementation  (Development + contingency costs)  initial income before system implementation) = (1,200,000  (125,000 + 50,000)  800,000) = 225,000 US dollars in the year following the dashboards implementation.

Calculating this monetary organizational value (MOV) as a percentage yields (225,000/175,000) x 100 = 128.6%

The project network diagram for the intranet dashboard

Network Diagram for Stakes International dashboard project
A project network diagram is an illustration that shows the main activities within a project and their sequential arrangement showing their dependencies. The project network diagram for this intranet dashboard application will have seven main activities described by the work breakdown structure shown below

Task number Predecessor task Activity definition Duration (Days)
1  Team formation 3
2 1 Fact finding 10
3 2 Statement of requirement for the intranet dashboard 5
4 3 Business system options 10
5 4 System specification 20
6 5 Build system/ testing

  • 1stIteration
  • 2ndIteration
  • 3rdIteration
70
7 6 Implement system 2

Estimated labour requirements for the intranet dashboard project

Team metro who will be handling this project is a team consisting of a project leader, an analyst, a programmer and a scribe. This team will work liaising with Stakes International project manager as the user representative. The estimations of labour requirements for this project will total to 114,000 US dollars as indicated in the breakdown that follows:

  1. Project manager (user- Stakes International): As a user representative, the manager will sit on the project team representing Stake Internationals interests. The manager will have a charge to define the user requirements during the iterations and will not be assigned to the project team full time but will be invited during the main deliverables in order for the project team to effectively capture these requirements. The project manager will draw a daily pay of 200 US dollars and is likely to provide input during the fact finding, system specification, system building and testing and implementation.
  2. Project leader (Team metro): This position entails composing the project team and managing the project through to its completion. The project leader will be fully engaged during the project life cycle for the period of 120 days. The project leader will receive a daily pay of 300 US dollars for a full time service during the projects life cycle.
  3. Analyst (Team metro): This position requires that the incumbent carry out the fact-finding exercise and evaluate the various business system options. The analyst will be charged with the responsibility of preparing the system specification as well as providing pertinent data needed during system testing. The analyst will also be engaged full time on the project at a daily rate of 180 US dollars.
  4. Programmer (Team metro): The programmer will translate system specification (functional view) into the necessary coding to derive the functional dashboard. The programmer will also liaise with the user representative to incorporate within the dashboard the necessary network parameters to ensure that the uploaded dashboard functions as required. The programmer will liaise with the analyst and user during system testing. This is a full time engagement at a daily rate of 150 US dollars.
  5. Scribe (Team metro): The responsibility charged here is that of compiling all project related documentation. The scribe will also take down the minutes of all project status review meetings carried out during the projects life cycle. The scribe is a full time engagement that will attract a daily remuneration of 120 US dollars.

Assumptions

  1. The project team will work seven days a week 8am to 4pm throughout the projects life cycle with no regard to holidays.
  2. The project team will be fully dedicated to the project.
  3. Team metro has the necessary technical expertise to carry out the project to its completion.

Constraints

The overall project cost is established at 125,000 US dollars with a contingency funding of 50,000 US dollars. However should the budget surpass this figures maybe due to change in technology, Stakes International is likely to shelf the project.

Conclusion

Interim reports are an important accompaniment to any project as a summary document detailing the areas covered within a proposal (Papalambros, 2004). Stakes International is likely to derive this benefit based on this interim report.

References

Marchewka, J.T. (2009). Information technology project management (3rd ed.). London: Wiley & sons.

Papalambros, P.Y. (2004). Principles of optimal design: Project guidelines. Web.

Rioux, M. (2008). A guide to the project management body of knowledge. Project management institute, 40(1), 15-32.

Schwalbe, K. (2005). Information technology project management (4th ed.). Cambridge, Massachusetts: Course Technology.

How Technology Impacts Careers: Education, Medicine, Retail Outlets

Introduction

One of the most dynamic aspects of this world is technology, this is the science that human beings use to make work easier, develop new products, and refine natural products to add value. All this is aimed at making sure that man enjoys anything better, anything within his reach. Technology is very dynamic and keeps on changing every day with new and newer innovations. This has a very big impact on human beings and their careers; it has changed the management and running of almost all spheres of the world. The impacts felt out of technology are both positive and negative. This study will take a deeper insight into the impact technology has dealt the Retail stores, Medicine, and Education.

Impact of Technology in Education careers

Education is the art that imparts knowledge to the human race, for the sake of survival, advancement, and continuity; it can be termed as the epicenter of all technologies, innovations, and human development. Careers in education generally rotate around the transmission of knowledge through means of channels that can either be technologically supported or can be done with little infuse of technology (Oak 1). The salaries for educationists vary greatly among practitioners depending on the level they teach as well as on subjects. The pay rate per hour ranges between $24.30 for elementary instructors to $39.80 for university education professors (Education America 1). One of the biggest inventions in the world that has a direct impact on educational careers is the computer; with the internet, it is now easier to access information interactively, on a web page there are very many items that would make any reader keep on to that page. To search for certain information one just needs to enter the information that is being sought and a huge database will be availed and which makes it very easy for the information seeker. This is more advantageous because the info seeker will be able to compare various sources and that enables one to come up with very concrete facts. This technology has changed the way education is conducted. Universities have embraced this technology and thousands across the world can advance their education. This system compels all teaching staff to be well above computer literate. The educator has a lesser workload. Since almost all information is available online, issues of morals and the amount of time spent by those within education professions have been an issue of great concern. Many within these careers are akin to spending considerable time of productive hours doing social networking online, denying them a chance to interact actively on a face-to-face basis with their students. It is unethical to use a mobile phone while teaching.

Impact of technology on Medicine

Medicine is another branch of human science that has existed from time immemorial, human beings have always sought solutions and remedies to any difficult situation that they may find themselves in. The human body is always under constant threat from parasites, bacteria, viruses, and many other microorganisms that bring discomfort to the body in form of illness. Human beings have been on a constant warpath with this microorganism and thus there has been an increased need for advanced technology that will aid the human race to fight disease. The biggest pie of this technology lies in hospitals where issues like looking inside the body is now a reality, some machines can scan the body and help identify a source of the problem. A brain or heart operation can be done without opening the skull or the chest. Babies have been made in test tubes implanted into the uterus and delivered normally. It is not only the hospitals, who have embraced the technology, in Britain an ordinary patient expects the state of the art technology to be used in treatment, to some patients if these state of art machines are not used, but they also view this as an act of negligence and lack of ethics. This however does not apply to just any other technology but it is only to the tested ones, the ones that are known to have worked. New technologies are received with lots of apprehensions. There is the fear of risks and side effects and the consequences. This makes their spread and uses quite sluggish (Symonds 1). Cloning is another technology that is used in science and medicine as a way of understanding human gene development to fight some illnesses and conditions that occur in human beings. There are three types of cloning, Recombinant DNA technology is a molecular process where chromosomes, yeast, and bacteria cells are generated. The second form of cloning is the reproductive one whereby, technology is used to generate an animal, genetic material is extracted from the nucleus of a donor adult cell and put to an egg. Then they are treated with electric waves and later transferred to a uterus. There it develops until a normal birth. (U.S DEOS 1) The third form of cloning is therapeutic cloning also called embryo cloning, here human embryos are developed for research purposes, and stem cells are harvested and used for bio-medical research. In America, the highest-paid medical practitioner is an anesthesiologist who earns 251,524$, a physician earns 149,541$, a Dentist, 122, 878, $ general surgeon 229,362$ while the lowest-earning is a pediatrician with 221, 960$. This is a career that America has invested heavily in by hiring foreign practitioners. It is unethical for a doctor to use a mobile phone while attending to a patient. One of the biggest risks in technology is a technical failure in a crucial machine which can lead to death.

Impact of technology on Retail Stores

Retail stores and retail businesses have for a long period grappled with how best to manage their cash flow. Handling cash is tempting and also a very tricky affair. With the onset of retail technology, there has been an almost complete makeover in this sector. Credit and debit cards have come to replace cash; this has made shopping easier and more relaxed since no security worries of having liquid cash with you. Since most of these cards are acceptable in many parts of the world, international travel is hustle-free, a traveler will access services and goods from anywhere in the world simply by using a credit or debit card. On the security aspect, both the retailer and the buyer are safer. Companies have embraced the use of vending machines, this is stocked and placed in some strategic positions in the market, since they are unmanned they write off the cost of labor and hence more gains to the retailer. On the same line in many countries parking tickets are issued by automated machines this increases efficiency and also reduces the wage bill by a big margin. Internet is one development that has significantly changed the face of the retail business, no one can buy goods and services online and pay for them online. Retail outlets have also benefitted immensely from technology, at the till a computerized system works, all prices are on the bar code and the cashier just directs a laser ray on the barcode and the price of the item is fed to the system. This saves time and also helps the retailer in cash consolidation. Human beings will always be apprehensive of new ideas, many people feared that technology will lead to job losses but in the real sense, technology leads to the opening of new job opportunities. Remuneration in the retail market is much lower compared to medicine the highest-earning retail store manager gets 70,476$ while the lowest-paid gets 40,216$,

America is a big employer and in these three careers which are low-risk careers, there are opportunities locally or in the export market

References

Lamp, JM. and Howard, PA. Guiding Parents to Use Internet for the Newborn Education Vol. 24 (1), 1999. Web.

Oak Manali. Impact of Technology on Education, Buzzle.com, 2010. Web.

Symonds Peter. Medicine as new technology. Making the modern world. 2004. Web.

U.S. Department of energy, office of science. Cloning Facts Sheet. Human Genome Project Information, 2009. Web.

UNEP. Multilateral Environmental Agreements and the WTO. UNEP Briefs on Economics, 2002. Web.

EducationAmerica.net. US Teachers Salaries and Career Information. Education America, 2008. Web.

The Shaping Control of Technology

The theory of cultural lag explores how culture takes much time to catch up with new technological advancements (Appleman, 2008, p. 32). According to supporters of the theory, such a lag can cause numerous societal conflicts or problems. For example, the use of modern technologies has led to new inventions such as stem cells and genetically-modified foods (Appleman, 2008). Although such developments might be beneficial to mankind, the agreeable fact is they have resulted in numerous ethical concerns.

Convergence theory argues that different communities develop new requirements in order for them to operate and function effectively (Appleman, 2008). When societies become industrialized, they acquire new functions and structures thus resembling other developed communities. This theory is supported by the similarities exhibited by mixed economies such as Germany and Japan. The United States and the USSR developed similar industrial capabilities especially after the Second World War.

The federal government has the potential to dictate every course of technological advancement. The government sponsors various studies and researches that can result in new technologies. The missions executed by NASA explain the importance of the government towards supporting various technological developments. The government also implements policies to dictate the manner in which modern technologies are developed, shared, and used by its citizens (Volti, 2014).

The Office of Science and Technology Policy (OSTP) was established in 1976 with the aim of advising the Executive on the issues surrounding new technologies. The purpose of the office was to ensure every new technology was sound and profitable (Office of Science and Technology Policy, 2016). The role of the office is to ensure every technological work is coordinated in a professional manner and supports the needs of the society.

Governments and corporations have the potential to control the World Wide Web (Al-Jazeera English, 2012). Different bills have been proposed to ensure the government controls the Web. However, such laws have encountered diverse views from different people. For instance, many people have been opposed to the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) bills (Appleman, 2008). Such opponents argued that such bills threatened the wave of human innovation.

The bills could also empower law enforcers to bock every form of internet access. As well, the bills threatened the rights of more people. On the other hand, some people supported the bills because they could protect the intellectual properties of many entrepreneurs (Page, 2012). The bills were also aimed at protecting many jobs, institutions, revenues, and industries. Many companies were also expected to benefit from the war against online piracy. I would support the bills and laws if only there were implemented in a proper manner (Volti, 2014). As well, the government should not use such laws to block the internet.

The decision to give the government remote control over private routers is advantageous if executed in a professional manner. However, the move can produce numerous problems such as insecurity. The current technological issues, social implications, and legal considerations explain why new researches are needed. That being the situation, I would not give the government remote control over my router.

This is the case because the strategy will ensure the ultimate control of the router is no longer in the hands of the owner. As well, the move can produce numerous problems during the implementation process. The decision can also increase chances of abuse and eventually affect the rights of many citizens (Brodkin, 2012). The owners control will also be reduced thus affecting the usability of the internet. Theoretically, it should be acknowledgeable that the principle will be hard to implement. The move will also affect the liberties of more citizens and increase cases of cybercrime in the country.

The other important issue is associated with an internet kill switch (Page, 2012). I strongly believe that there should not be an internet kill switch. To begin with, it would be impossible for the government to clamp down every form of internet access. As well, the countrys law is against such a dictatorial shutdown (Page, 2012). The countrys internet access is provided by many companies.

Such companies are engaged in business activities and therefore the government would find it impossible to block the internet. However, the government can engage in such an authoritarian act and eventually turn off the internet. The important thing is to ensure there are valid laws prohibiting the government from imposing such an internet kill switch. This move will protect the rights and liberties of every citizen in the country.

Human beings have for centuries treated themselves as unique creatures. The book Pale Blue Dot: A Vision of the Human Future in Space goes further to describe the Earth as a small planet in the Solar System. Human beings should no longer be Earth-centered. They should focus on the best strategies in order to save humanity. The human race can be saved through space colonization. People should explore the dangers faced by planet Earth (Sagan, 1997). Comets and heavenly bodies pose a major threat to planet Earth. This knowledge therefore encourages people to widen their views. They should consider the best technologies and strategies that will support their existence in the wider solar system.

Reference List

Al-Jazeera English. (2012). . Web.

Appleman, L. (2008). Redesigning the Internet for Content Regulation. Boca Raton, FL: Universal Publishers.

Brodkin, J. (2012). . Web.

Office of Science and Technology Policy. (2016). Web.

Page, E. (2012). The Internet Kill Switch: Is It Possible for the Government to Turn Off the Internet. Web.

Sagan, C. (1997). Pale Blue Dot: A Vision of the Human Future in Space. New York, NY: Ballantine Books.

Volti, R. (2014). Society and Technological Change. New York, NY: Worth Publishers.

Saving Energy Systems: Water Heater Technology

Introduction

A water heater is a device that is used at homes to heat water for bathing. It works on the principle of converting electrical energy into heat energy. The following components make up water heaters: tank, dip tube, shut-off valve, heat-out pipe, thermostat, heating elements, drain valve, pressure relief valve, and a sacrificial anode rod. It is important to underscore that all the components should work in a coordinated manner for the device to function.

Modern water heating devices are designed with efficient systems of saving energy. For example, setting a water heater to relatively low temperatures could greatly save energy. Many manufacturers recommend that the devices should have temperature settings within a range of 49oC to 60oC.

Discussion

The following discussion relies on the components shown in Figure 1 in this paper.

Tank

The inner portion of a water-heating device is made of a heavy metal material that contains a protective liner. In most cases, a tank can hold about 151 to 227 liters of water. The exterior part of a tank is composed of an insulating substance, such as polyurethane foam. In addition, an outermost layer gives the device more insulting properties.

Dip tube

This part is at the top of a tank. Water enters a water heater through the component.

Shut-off valve

This is located outside the heating device. Its main function is to stop water flowing into a water heater when a tank is full. Thus, it is essential to avoid water wastage that could result from overflows.

Heat-out pipe

Once the water is heated, it is critical to allow it to exit the heating unit. Thus, this component is important to act as a channel through heated water flows out of the device. If heated water does not flow out, then this could result in some levels of inefficiencies.

Thermostat

This is used to control temperatures within a water heater. In fact, when a maximum temperature value is attained, the component leads to a disconnection of electrical circuits, which are only reconnected when temperatures reduce remarkably.

Heating elements

Heating elements are contained within a tank. They are the main components that are used to heat water. They conduct electrical energy and convert it into heat energy by becoming red hot.

Drain valve

This is situated near the bottom of the external part of a tank. It is used to achieve three goals. First, it empties a tank when it is necessary to replace the elements. Second, it is crucial to remove sediments. Third, it is used when moving a tank to another location.

Pressure relief valve

This component is utilized to maintain pressure in a device within safe limits. It is important to note that excess pressure could result in damage and altered heating efficiencies.

Sacrificial anode rod

The purpose of the component is to retard corrosion. It is made of magnesium or aluminium.

A gas heater looks like an electric unit, except that it doesn't contain the two heating elements.
A gas heater looks like an electric unit, except that it doesnt contain the two heating elements. It has a gas burner at the bottom, with the chimney running up through the middle of the tank.

Conclusion

Water heaters work by converting electrical energy into heat energy, which is utilized to make cold water hot. A standard water-heating device has the following components, which function in a coordinated manner: heating elements, tank, dip tube, drain valve, heat-out pipe, a sacrificial anode rod, thermostat, pressure relief valve, and shut-off valve. It is critical to emphasize that safe limits of temperature and pressure are maintained in a water heater.

Information and Communications Technologys Digital Divide

A digital divide is a form of inequality that manifests in social and economic spheres as a result of some sections of a community that do not access and use knowledge with respect to information and communications technology (ICT). From a multinational perspective, the divide that exists between countries due to limited access to ICT is known as global digital gap (Lu and Mingxin 5).

In the recent past, it has been argued that ICT is critical to achieving many positive impacts on society, which could be realized in terms of social changes and excellent development outcomes. The internet is one of the best applied ICT resources to attaining social changes and economic developments.

However, it is notable that only seven percent of people in Africa can access the internet. In fact, it is not only people in the continent that have limited access to online resources, but also other citizens in many developing nations that are outside Africa. This paper discusses how ICT impacts economies around the world.

It highlights the steps that the United Nations has taken to reduce the negative impacts of the digital divide. In addition, it provides information about organizations that are addressing the issue in their programs. Finally, it provides a case study of a nation in Africa that is implementing effective strategies to reduce the divide.

The United Nations states that the digital divide is a gap that exists between those who have ready access to ICT and the skills that make use of technology and those who do not have the access or the skills to use the same technology within a geographical area and/or community (United Nations 3). Various reasons have been suggested to explain why the gap exists in the modern world. For example, some persons argue that the issue is greatly impacted by income levels among people in the population.

Thus, it would be expected that rich people use ICT more than poor people (Youqian and Bingsi 4). As a result of the knowledge that is generated from ICT tools, rich persons in society continue to prosper in terms of material possessions. Thus, it is correct to assert that the traditional third world is being defined by the extent to which a nation has access to and use digital technologies, which are applicable to many sectors of the economy (United Nations 7).

The United Nations aims at significantly reducing the digital gap among nations to foster economic development in many industries. The commitment by the global body can be viewed from the perspective of its main goals, which focus on uniting all people and nations across the world. The agency holds that sustainable development can be achieved by adopting modern communication tools, such as ICT instruments that support electronic governments.

It is no doubt that nations that have incorporated ICT in their public offices have improved sustainable development. The United Nations concentrates on reducing the digital gap by addressing several aspects, such as ICT penetration, ICT take-up rates, ICT contexts, and knowledge levels among people in offices and those being offered services. In my opinion, I think that the UN can assist many countries and persons if it could succeed in its ambitious goal of reducing the digital divide.

In fact, I believe that it has taken the right steps in identifying aspects that could hamper its objectives. For example, in 2012, it conducted a survey to determine the number of vulnerable groups that could not access and use electronic government tools (United Nations 13). However, it is disheartening to learn that many governments do not integrate vulnerable groups and encourage them to use ICT instruments.

In my opinion, the United Nations will not succeed in its goal of reducing the digital divide around the world. My opinion could be supported by two key reasons. First, the program requires efforts from various governments. In other words, a nation should be willing to use electronic government structures. If there is no good will from the leadership, then the UN cannot succeed. It can be argued that many governments would not be willing to incorporate ICT into their governance structures.

Second, the use of ICT requires people to be equipped with knowledge in terms of reading and writing. However, in the developing world, many people do not read and write, implying that they cannot use basic ICT applications. Thus, the UN might be forced to ensure that all people around the world are educated before it would reduce the digital gap.

Private companies and foundations are also at the forefront to reduce the digital divide. For example, the International Business Machines (IBM) and Bill & Melinda Gates Foundation, among others are keen on ensuring that people and nations are not impacted negatively by their limited to and use of ICT tools.

For example, the Bill & Melinda Gates Foundation gives grants to various libraries within and outside the US to help to design and use structures that can go a long way in reducing the digital gap (Bill & Melinda Gates Foundation 1).

Although excellent funding supports its efforts, it will require the commitment of governments. As stated in the case of the UN, the level of illiteracy is very high in the developing world, implying that even the private bodies will not be successful in the near future. However, if governments can encourage and support their citizens to be educated, then the efforts of private companies can remarkably reduce the digital gap.

Many countries in Africa do not have excellent use of ICT tools due to lack of systems for supporting such platforms. This is attributed to low educational levels and lack of funds to maintain ICT programs. However, Liberia is among the nations in Africa that have significantly reduced the digital divide (Treisman 1). The government in the nation has utilized ICT structures that have resulted in a better utilization of public information. Many agencies are working hard to ensure that people have better lives due to use of ICT.

For example, the Accountability Lab and iLab Liberia are at the forefront to ensure that a data hub goes a long way in supporting the operations of the government. This is being done in collaboration with the Ministry of Information, Cultural Affairs, and Tourism (Treisman 13). The Accountability Lab hopes that the digital gap will be reduced in the nation in the short-term because many people are using digital mobile tools, such as phones, for communication.

Conclusion

From the discussion in this paper, it is evident that ICT tools are essential to economic growth. The digital gap is apparent in nations where illiteracy levels are high. The UN and other agencies aim at reducing the negative impacts of the issue. However, governments in many nations around the world should be willing to support their efforts. Liberia is among the nations in Africa that have benefited in relation to the use of ICT tools.

Works Cited

Bill & Melinda Gates Foundation. The Bill & Melinda Gates Foundations U.S. Library Program distributes final round of grant applications. 2013. Web.

Lu, Wei, and Zhang Mingxin. The Third Digital Divide: The Knowledge Gap on the Internet [J]. Journalism & Communication 4.8 (2006): 5-9. Print.

Treisman, Loren. Access to information: bridging the digital divide in Africa. 2014. Web.

United Nations. Bridging the digital divide by reaching out to vulnerable populations. 2013. Web.

Youqian, Wu, and Fan Bingsi. On the digital gap and the role of public libraries during the network era [J]. New Century Library 5 (2004): 1-12. Print.

Technology Effect on Early Learning

The modern child is growing in a constantly changing digital age different from that of their parents or grandparents. Modern homes and schools harbor a variety of technological tools, which if utilized wisely, can effectively support the growth, and learning of the child.

This will develop their educational background and mold them into creative beings. For instance, pre-school children have exposure to playing with cars and colors on iPads. Snapdragons nursery school in Britain is an example where children learn basics about colors, numbers, and letters using iPads (Hong & Trepanier-Street, 2004). Therefore, the use of technology in schools is beneficial to the initial development stages of a child.

Because of the extended internet usage, children experience the varied scope of digital challenges. Exposure to different technological machines gives different feelings to the child. Families in the United Kingdom possess personal computers and internet-enabled phones (Gutnick, et al, 2011). Children from this environment have a different experience from a child in Korea using iPads for learning basics.

The exposure to digital experiences is slowly rewiring and reshaping the cognitive process of the modern child. This has a direct influence on the education layout of the modern child. Children prefer digital experience as it has multi-task parallel processing, is more comfortable, and works faster. Technology, therefore, affects the development of children in various aspects. The digital problem intensifies as more children get exposed to digital life.

The dire expectation is that the problem is to become worse in the future with the spread of digital technology. Studies and research have found digital exposure to influence the language and cognitive development of a child. In the long term, this influence will affect the behavioral contacts of children in most of the life disciplines. Children will influence to take subjects that expand their digital life or those which in a way have the link to the same.

References

Australian Communications and Media Authority (2011). Use of electronic media and communications: Early childhood to teenage years Growing up in Australia; the Longitudinal Study of Australian Children. Web.

Gutnick, A. L., Robb, M., Takeuchi, L., & Kotler, J. (2011). Always connected: The new digital media habits of young children. New York: The Joan Ganz Cooney Center at Sesame Workshop. Web.

Hong, S. B., & Trepanier-Street, M. (2004). Technology: A tool for knowledge construction in a Reggio Emilia inspired teacher education program. Early childhood education Journal, 32(2), 87-94. Web.

Takeuchi, L. M. (2011). Families matter: Designing media for a digital age. Web.

Telecommunications, the Internet and Wireless Technology

Business advantages of using Voice over Internet Protocol (VoIP)

VoIP is cost-effective and saves a lot of money, as the only cost incurred is quality internet access cost. The hardware used is inexpensive as sound cards, speakers and microphones are the only needed devices. Additionally, the software is also less expensive and easily available; for instance, the use of Skype. VoIP allows real-time communication through video conferencing or phone calls, thus allowing a prompt response from the audience. Since information delivery and response is instant, customer relationship is enhanced, while service delivery and productivity are likely to improve. Moreover, it enhances the portability and flexibility of communication over a large geographical spread.1.

RFID systems use in inventory control and supply chain management

RFID uses microchips embedded in tiny tags. These microchips possess data relating to a particular item, including the identification number and location. The rest of the tag is an antenna that transmits data to a reader using radio waves. The RFID reader also has an antenna that constantly transmits data such that, if it senses a tag, it interrogates it and decodes the data carried in it. The readers then send data to the host system over wired or wireless connections, which in turn show the exact location of the item.

Wireless sensor networks

Wireless Sensor Networks (WSNs) are networks of hundreds or thousands of interconnected wireless devices embedded into the physical environment to provide measurements of many points over large spaces. These devices have in-built processing, storage, and radiofrequency sensors and antenna. They require low power, long-lasting batteries and the ability to endure the field without maintenance. The network is organized into nodes, lower nodes and upper nodes. Generally, the lower nodes forward data to each other, or to higher-level nodes, which transmit data more rapidly and speed up network performance. Then, the network routes the data to a computer for analysis. The server to which the sensors data is sent to acts as a gateway to a network based on internet technology. The main uses of these WSNs include monitoring building security, detecting hazardous substances in the air, monitoring environmental changes, traffic, or military activity.

Web 3.0

Web 3.0 is intelligent, meaning-based, semantic computing projected to improve the web in order to make searching the Web more productive and meaningful to people. There is an increase in cloud computing, hence diverse and unlimited connectivity between mobile and other access devices.2. This will make the Web a smoother experience. Businesses apply the consumer-driven design, with socially connected mobile applications presenting a marketing application but at more advanced levels. Mobile applications for Smartphone that scan barcodes and present pricing along with customer reviews, are becoming common.

In addition, companies ratings are now being accessed with product information, showing if the product in question is offered by a company with responsible investment policies, equitable hiring practices, an appropriate commitment to philanthropy, and a firm policy toward workplace diversity. This will make the market place more personal, and companies carry higher moral responsibilities. Web 3.0 will bring the revolution in social businesses.

Blogs, Wikis and social networking sites use in business

There is increased usage of Web 2.0 tools by organizations in a bid to foster a relationship with the main stakeholders, including associates and clients. They offer a wide range of advantages, such as interactivity and user-generated content. For example, Wikis are used in businesses to share information, like list answers to FAQs about each product, and consumers have added significant contributions. Secondly, consumers can discuss among themselves a topic of their choosing. Thirdly, some social networks provide financial platforms aimed at enhancing the participation of firms clients.

Bibliography

Laudon, K & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.

Footnotes

  1. K Laudon & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.
  2. K Laudon & J Laudon, Management Information Systems, Prentice Hall PTR, NY, 2011.

Technology Trends in Education

How the past shaped the present about educational technology?

Although technologies do bring many advantages for an educational process, after several decades of using computers, gadgets, and the World Wide Web, we have learned something. First of all, as Roblyer and Doering (2013, p. 10) claim, no technology is a panacea for education. Even the best and the latest innovations are only machines  they are not able to define and meet all the specific needs of students.

So, teachers are still much more valuable. Secondly, the opportunities brought by technologies are not always the best solution. As proof of it, Skype is widely used for communicating; however, live chat is always preferable. And finally, it is impossible to keep pace with all the latest technologies, since, as history shows, they change too fast. Therefore, teachers can not be guided by technologies only.

Have educational standards and assessments changed due to technology?

When the first technologies appeared, many educational establishments wanted to implement them in their learning process. Huge parts of the budgets were spent to buy new computers, get Internet access, and so on (Halverson & Smith 2009, p. 50). However, the implementation was not very easy. Many years passed before technologies changed the educational process and teaching practice. Firstly, they contributed to information and communication systems, changing the way how students learning data was collected, stored, and analyzed. Finally, education was rethought fundamentally: eBooks and tablets replaced textbooks, chalkboard began to disappear, libraries gave place to web-based research, etc. Students do not even pass notes to each other now  they just text.

Explain and understand the difference between educational and instructional technology

In some cases, educational and instructional technologies do overlap but although a lot of people think those are synonyms, that is not right. Instructional technology is only a part of an educational one. So, educational technology is a broader term. The subtle difference between them follows from the very concepts of education and instruction. Instruction is written by someone (in detail) and is aimed to achieve particular outcomes. Education, according to AETC, refers to various activities& that support learning, including unplanned ones (Hodges 2006, para. 5). So, instructional technology is only a tool, which educational one implements to achieve the primary goals of education.

Explain why 21st Century Skills are important for learners and teachers

With the term 21st Century Skills, we usually associate critical and creative thinking, problem-solving, ability to communicate and collaborate with others, computer literacy, leadership skills, etc. (Pacific Policy Research Center 2010).

Those are necessary for both teachers and learners since the world of education is constantly changing, and if you want to meet its demands, adapt to its changes, and finally succeed, you simply do not have any other option. Without an ability of critical thinking, a person would not be able to solve problems, both professional and personal ones. Without creativity, it is impossible to innovate. Without leadership skills, you would never make people listen to your ideas.

Determine how technology trends can affect your views on teaching and learning

Surely, I agree that technologies have already firmly rooted in our lives, and an educational process is not an exception. I support the use of the Internet for research, tablets instead of textbooks, e-learning, cloud computing, and many other technical innovations. However, I do not think that we should rely only on those. I believe that the excessive use of modern technologies can deprive us of the ability to think critically and solve problems without the help of gadgets. As an example, when you type something in Word, and it corrects your mistakes, you begin forgetting the spelling of some words.

The video, Writing an Article Critique, suggests several tips for writing an article critique. Identify one of them and tell us why you believe it is a good tip

In the video mentioned above, I have liked the tip regarding the citations most of all. The narrator focuses on a direct quote and demonstrates a good example of it and then a bad one. This advice is helpful since it teaches to get rid of long quotations (shorten them as much as possible), write the same in your own words, and make it sound more natural and comprehensible for the readers.

Reference List

Halverson, R & Smith, A 2009, How New Technologies Have (and Have Not) Changed Teaching and Learning in Schools, Journal of Computing in Teacher Education, vol. 26, no. 2, pp. 49-54.

Hodges, Amanda 2006, . Web.

Pacific Policy Research Center 2010, 21st Century Skills for Students and Teachers. Web.

Roblyer, MD & Doering AH 2013, Integrating Educational Technology into Teaching, Pearson Education, Boston.