Is there too much of a good thing with the amount of content that you can find on the internet? Not only is there an overabundance of good content but it is fast becoming like the proverbial “needle in a haystack” for a user to locate quality information quickly and efficiently amongst the bad, tragic or just mediocre content on offer in our digital smorgasbord.
With the fast approaching world of Web 3.0 and the advent of the Internet of Things (IoT) means that the internet and its horizon is an ever-changing and evolving landscape that can provide personalised information to the user and about the user. You do have to question if this is always a good thing.
The 2016 NMC Technology Outlook – Australian Tertiary Education noted that learner analytics and location intelligence, which information is a form of big data, are areas that will have an impact in the next few years.
Big Data and meta data (data about data) have become a key focus with regards to who is creating, storing, using and most importantly selling data about you and what you look at. Think about the last time you searched for anything and you will have been prompted with possible fee-for-service products that might be similar to what you have been looking at.
Another form that this takes is when you are on social media sites such as Facebook™ you will notice based on your searches, friends and groups that “sponsored” sites appear as suggestions you might like to follow. You will also be aware (if you are using a desktop that there is an advertisement stream that is tailored for you. How does it know what you have been looking at while you are not on Facebook, simply it is from the cache in your computer or smart device and your browser history.
But when you consider the importance of how you can use learner analytics and learner actions within your site to track what they have been reviewing to ensure that the content of the course is meeting their needs then bib data is not seen quite so much in a horrible tracking light – stalking your movements around the internet, but a useful tool to support and help students.
With the increase in the cost of creating print products and the speed that these products become redundant saw the rise of Web 2.0 technologies that enabled user-generated content simply easily and cheaply. This power to the masses revolution of technology has meant that often we do forget that the internet is ‘forever’. Need proof that this is the case, then please feel free to review the Internet Archive Wayback Machine.
It is interesting that with the increase of the individual’s ability to have a voice on the internet has seen many companies fall-by-the-wayside as they have not adapted and changed their business structures to compensate for the new market place. Some may argue that if you do not adapt to the market place to survive then you do not have the right to survive.
So with that thought where does this leave educators? In this brand new world are we expecting teachers to become technology experts to guide students to some mythical promised land of better understanding? I would say that at best we need to encourage our teachers to become the facilitators of tomorrow. This means that we must move away from the “sage on the stage” mentality to perhaps taking up the guide on the side role where technology plays a helpful hand in supporting and augmenting learning for students. Technology can support student outcomes but should never dictate or drive the learning.
So the future is looking bright, but is it looking as bright as it once was or are we seeing it through a binary code induced haze? Time will tell.
De Saulles, M. (2012). New models of information production. In Information 2.0: New models of information production, distribution and consumption (pp. 13-35). London: Facet.
Kellmereit, D. and Obodovski, D. (2013). The Silent Intelligence: The Internet of Things. DnD Ventures 1st edition, California.
Roblyer, M. (2013). Integrating Educational Technology into Teaching. Harlow: Pearson.
The New Media Consortium. (2016). 2016 NMC Technology Outlook Australian Tertiary Education. Retrieved 7 July 2016, from http://www.nmc.org/publication/2016-nmc-technology-outlook-australian-tertiary-education/
I came to INF530 with a very different perspective, as I had already completed three other units and this semester saw me working my way through a further two units, almost an information overload! In the past I have seen my previous knowledge almost as unwanted baggage, but in INF530 I think I have now checked my baggage into the plane’s cargo hold for the rest of the trip.
This subject has helped revisit and consolidate a great deal of learning that I’ve already completed. I was challenged and able to delve into topics that were of interest to me and my work such as the impact of the Internet of Things, Big Data, Personal Learning Environments and Blended Delivery.
Throughout this course I have often felt that we are looking at a giant personalized jigsaw puzzle and we have to search to find the meaning and thus all the pieces will click into place.
The only way to discover what the personalized puzzle looks like is by engaging with the content and peers. Knowing how you learn and working to your strengths along with your peers is the way forward to successfully grapple the content into a manageable and meaningful form. This is why our tasks are designed to be authentic, active learning activities (Buzzard, Crittenden, Crittenden & McCarty, 2011; D’Aloisio, 2006; Day & Kumar, 2010; Herrington & Parker, 2013; Herrington, Reeves, Oliver, & Woo, 2010).
Learning by doing is almost the mantra of the whole of this course, and because of this fits with the makerspaces movement ethos well (O’Connell, 2015). In keeping with this philosophy of active learning and makerspaces to I try to challenge myself to create something different every unit with a new technology as part of my ongoing professional learning. The digital essay enabled me to trial Sway (Microsoft, 2015), so simple and I will be showcasing this again. I also created collage images using Adobe Photoshop and a nice simple jigsaw puzzle creation online software (BigHugeLabs, 2015). All of this means that I take away from this unit a new set of skills and a solid understanding of how these skills can supplement a VET practitioner’s bag-of-tricks in creating a satisfying digital experience for students.
I’m always happy to share snippets with others of information, such as around Digital Preservation – Snow Byte and the Seven Formats.
I featured this video in an INF443 assessment. Reviewing the Digital Preservation content from both INF530 and INF443 bought to light some serious issues in preservation of student’s digital content for audit purposes in the VET sector. This content has formed the basis of a webinar presentation I have created for the Department of Training and Workforce Development to inform organisations of their ongoing obligations.
The Big data topic really made me stop, think, research and reflect on the Unique Student Identifier code that has been rolled out for the VET sector. There is such an impact of big data and how we deal with it that this will be an ongoing issue into the future especially in relation to personal data which of course linked into the Internet of Things (IoT). I specifically chose a book about IoT for my scholarly review, to challenge and enlighten my throughs around this topic so I can inform others.
My journey is far from complete, and my puzzle still has more than a few pieces missing, (I may have to look under the table for them). The final destination of course is not where you learn. The journey and the people you meet and work with along the way will always be where you grow and learn. I look forward to moving onto the next step of my journey and finding the next set of puzzle pieces to help me finally complete my personal jigsaw.
BigHugeLabs. (2015). Jigsaw: Create jigsaw puzzles from your photos [Computer software].retrieved from http://bighugelabs.com/jigsaw.php
Buzzard, C., Crittenden, V., Crittenden, W., & McCarty, P. (2011). The Use of Digital Technologies in the Classroom A Teaching and Learning Perspective. Journal of Marketing Education, 33(2), 131-139. doi:10.1177/0273475311410845
D’Aloisio, A. (2006). Motivating students through awareness of the natural correlation between college learning and corporate work settings. College Teaching, 54(2), 225-230. doi:10.3200/CTCH.54.2.225-230
Day, J., & Kumar, M. (2010). Using SMS Text Messaging to Create Individualized and Interactive Experiences in Large Classes: A Beer Game Example. Decision Sciences Journal of Innovative Education, 8(1), 129-136. doi:10.1111/j.1540-4609.2009.00247.x
Herrington, J., & Parker, J. (2013). Emerging technologies as cognitive tools for authentic learning. British Journal of Educational Technology, 44(4), 607-615. doi:10.1111/bjet.12048
Herrington, J., Reeves, T., Oliver, R., & Woo, Y. (2004). Designing authentic activities in web-based courses. Journal of Computing In Higher Education, 16(1), 3-29. doi:10.1007/bf02960280 Retrieved from http://link.springer.com.ezproxy.csu.edu.au/article/10.1007/BF02960280
Microsoft. (2015). Sway [Computer software]. Retrieved from https://sway.com/
O’Connell, J. (2015). Hackerspaces and makerspaces [INF530 Module 5.4]. Retrieved 20 May, 2015, from Charles Sturt University website: https://interact2.csu.edu.au/bbcswebdav/pid-249314-dt-content-rid-635373_1/courses/S-INF530_201530_W_D/module5/5_4_Hackerspaces_makerspaces.html
This is a nice easy read, that give a good solid base level introduction to the concept of The Internet of Things. The book itself is not primarily education focused, but you can apply some of the key points to the education space. Well worth a look at.
Kellmereit, D. and Obodovski, D., (2013) The Silent Intelligence: The Internet of Things. DnD Ventures 1st edition, California.
The Silent Intelligence: The Internet of Things by Daniel Kellmereit and Daniel Obodovski (2013) presents an extensively researched analysis about the Internet of Things (IoT) which primarily was written for businesses looking to leverage on practical lessons and guidance from experts and companies in this field. Through interviews and case studies the readers are presented with both authentic examples and future forecast scenarios of use for both industry and individuals. The key objective of the book is for readers’ awareness to be raised about how connecting the physical world around us to the digital world can result in gains. Kellmereit and Obodovski (2013) also shared their own personal views with the reader on how to overcome obstacles with the IoT, which are specifically aimed at business investment and job opportunities.
Kellmereit and Obodovski (2013) pose five significant questions about the IoT: What is the Internet of Things? How is it coming about? What are the key trends? What is the potential? What needs to be done? The authors use these questions as a framework to explore the IoT concept. As part of this exploration three key ideas connecting the chapters: data collection; data transport; data analysis, especially around the issues of the role human interaction will play in the rapid expansion of this technology and the management of data produced by the IoT became apparent. These issues and ideas will form the basis to critique the theories developed in this book.
It becomes apparent thanks, to Kellmereit and Obodovski (2013), that the IoT is not a far-fetched vision of a digital utopia with the IoT incorporating machine–to–machine (M2M), machine–to–person (M2P) and person –to–person (P2) networked technologies. All digital learning technologies currently used in education are part of the IoT, a point many educators may not be aware of yet as the IoT has not been extensively covered in popular media.
In the book there are four identified focal points that the technology industry has created encompassing networked nodes around; connected cities; connected homes; connected health; and connected cars. Connected cities, provide information to town planners for traffic management energy optimization and building automation is collected via sensor and wireless communication data collected. Connected homes are sensing if people are at home and assisting with for energy consumption and making people comfortable and safe. Connected health currently supports people with chronic illnesses and Alzheimer’s by collecting data and location information and providing this to caregivers. Finally connected cars, most cars have ‘drive–by–wire’ implemented. This provides valuable information to service technicians at a service, but also aggregated information can create better fleet management in transport industries. These connected digital technologies are all networked nodes of data collection outlined in this book.
The data is collected via networked nodes, discussed by Kellmereit and Obodovski (2013), and is stored as raw ‘big data’ that can either be used by the original collector or supplied to third parties, provided that the metadata schemas match to will allow simple and effective data mining. The authors believe that this information collection is going to help us all become better citizens and allow us to better manage our facilities, including educational facilities, this is supported by the current project between CISCO and Swinburne University (Johnson, Adams, Estrada, Freeman, 2015).
It is argued in the book that as ‘things’ around us become smarter machines will take over more tasks, the human error rate for activities will fall, for example the research and development Google X project for self-driving cars. However, in education, current technologies are successfully being employed that are filling a niche requirement. Technologies currently being used include radio frequency identification (RFID) tags in an elearning project using RFID tags in a cabinet making workshop (E-standards.flexiblelearning.net.au, 2008) and quick reference (QR) codes for map reading in an outdoor education class (Lai, Chang, Wen-Shiane, Fan & Wu, 2013). These project have had to overcome technology hurdles for successful real-world application.
Technology in the past has been problematic, according to Kellmereit and Obodovski (2013), as the uptake has been prohibited by the expense especially specialist scanning hardware. With the arrival of QR codes to the digital landscape and cheap simple smart technology production using, for example, Rasberry Pi (Raspberrypi.org, 2015) and Arduino (Arduino.cc, 2015) modules means that there is a change in the landscape. This is fast becoming a core topic in many universities computer science courses such as the Open University’s My Digital Life course (Kortuem, Bandara, Smith, Richards & Petre, 2013). The exponential growth of the IoT and M2M arena is being driven by research projects in both industry and educational institutions.
The IoT according to The Silent Intelligence: The Internet of Things (2013) is a rapidly expanding dynamic space and one which Moores Law (Mooreslaw.org, 2015) can be applied to technologies involved. With this rapid expansion of the M2M technology the central challenge, according to the authors, is that people do not understand the reference architecture that is required to grasp the potential of the IoT. Peggy Smedly, from connected Worlds M2M, in the book suggested increasing the profile of IoT in the mass consumer marketplace by packaging technology into something that is easy for both companies and consumers to use, so not only offering a complete solution but from known and trusted brands, which directly contradicts Kellmereit and Obodovski (2013) focus for technology start-ups who will bring the creative edge to the market rather than staid traditional trusted companies. Once again universities adjusting programs in a responsive manner and supporting students in learning about, engaging with and building IoT technology (Callagaghan, 2013; Kellogg, Parks, Gollakota, Smith & Wetherall, 2014; Zhang, Callaghan, Shen, Davies, 2011) they will support the creative edge needed in this new space that Kellmereit and Obodovski (2013) see crucial for success.
A key theme in the book is the phenomenal rate of change that society is experiencing in all aspects of life due to the interconnectivity of smart devices. It is this silent revolution that humanity will not notice due to the pervasiveness of the IoT technology. Everything will become nodes on a network in a world where knowledge is universally accessible (Anderson & Rainie, 2014). Kellmereit and Obodovski (2013) alluded to well–defined old problems that the IoT can solve such as increased track ability, increased productivity, improved risk management, reduction in the guess work for planning projects and better connection to our environment. They do point out that the ‘human element’ is a key risk factor, but stop short of a definitive statement regarding issues resulting from the removal of people from the equation in the input of data in the IoT environment.
Kellmereit and Obodovski (2013) are quick to point out that the ‘human element’ is important and not superfluous to data analysis especially the interpretation of data and the subsequent recommendations for implementation. Data analysis is seen to be a growth area for companies with networked devices feeding systems that can improve tracking and tracing capabilities, such as the DriveCam example (Lytx, 2015) as discussed in the by Mark Wells interview (Kellmereit & Obodovski, p.93, 2013).
Kellmereit and Obodovski (2013) have a positive view of the IoT and handing over data collection, transport and analysis to digital technology. This ideology causes the reader to pause and reflect that our ‘smart devices’ are disrupting and in the very near future, if not already, are going to re-define society’s ways of living, interacting and learning, and consequently, will challenge our belief of what it is to be human (Theinternetofthings.eu, 2015).
Shared business models and industry standards, according to the book, are currently deficient in the IoT sector. Bill Gates said “In an age of interconnectivity, businesses need an architecture that extends outward to partners and customers. The successful companies select a few standards and enforce them strictly” (Gates & Hemingway, 1999). Setting standards and creating shared business models is an important step for industries to make in the IoT and M2M arena, because viable data linking from a variety of sources will allow the true potential to be discovered. Kellmereit and Obodovski (2013) put forward that without industry standards the IoT and M2Ms scale will always be defined by the narrow structures that each individual business use.
With the IoT being a relatively new concept and one which the possible ramifications are not widely understood there are some concerns that Kellmereit and Obodovski (2013) raise. One significant controversy outlined are ethical issues around the big data being captured by M2M, M2P and P2P technologies and the sovereignty of the data, especially as not all data retention and access levels are the same and similarly the treatment of data should not be the same. Sovereignty of data will become a crucial issue in years to come as the collection and use of data from sources versus the rights of individuals who are linked to the data will have ongoing ramifications to all industries, including the education sector.
Kellmereit and Obodovski (2013) mention very little regarding the responsibility of the carriers around data preservation and sharing, simply that there will be regulatory restrictions in other countries (this book was written and published for the American market). They discuss that data acquisition will be the growth market area for industries to capitalize on; this is a concern as there is little regulation regarding how metadata is managed, retained or shared by companies or countries, as seen in current media about metadata retention in Australia (Ag.gov.au, 2015). This lack of regulation has ramifications on data collection, transport, storage and analysis.
Data transportation in the digital realm is a concern for all areas of industry as well as the general community. The need to provide secure transport networks, be it via hardwire/cable, cellular, Wi-Fi and Bluetooth or RFID for short range communication which all have unique security protocols around the network to ensure that the data is safe during transport as well as during storage. This book did not provide any key information around this area other than that a company needed to develop a robust M2M policy to ensure that their data would be protected.
It is outlined in the book that business and industry need to optimise the technology architecture, which can be driven by work and research in the education sectors. This book perceives a disconnect between the high-tech community and industry Kellmereit and Obodovski (2013), however with the education sector making strong inroads into this space there will be a reconnection and synergy between these key market players on the IoT space.
Bill Gates once wrote “Business is going to change more in the next ten years than it has in the last fifty” (Gates & Hemingway, 1999) and this is especially true when looking at the IoT technology and the exponential growth that all industries, including education, will experience thanks to the prevalence of the IoT which will form the starting point for the next digital revolution if Kellmereit and Obodovski (2013) have it right.
Overall Kellmereit and Obodovski (2013) were successful in presenting a book that offered a broad overview of the IoT which then drilled down to specifics related to investment and business strategies. Their discussions around the new changing digital world and the way businesses, including education institutions, must adapt was illustrated by interesting use cases and interviews which met the writers aims set out in their introduction. However, this book only scratches the surface of the IoT and M2M technology and further reading would be necessary for an educator to fully grasp the implications both the IoT and M2M in relation to their current methodologies and technology systems being used. This is a challenging topic and one that Kellmereit and Obodovski (2013) provide a very broad base level introduction to.
Ag.gov.au,. (2015). Data retention | Attorney-General’s Department. Retrieved 18 April 2015, from http://www.ag.gov.au/dataretention
Anderson, J., & Rainie, L. (2014). The Internet of Things Will Thrive by 2025. Pew Research Center’s Internet & American Life Project. Retrieved 3 April 2015, from http://www.pewinternet.org/2014/05/14/internet-of-things/
Arduino.cc,. (2015). Arduino – Home. Retrieved 18 April 2015, from http://www.arduino.cc/
Callaghan, V. (2013). Buzz-Boarding; practical support for teaching computing based on the internet-of-things. In Higher Education Academy STEM: Annual Learning and Teaching Conference 2013: Where practice and pedagogy meet.. York: The Higher Education Academy. Retrieved from http://journals.heacademy.ac.uk/doi/abs/10.11120/stem.hea.2012.015
E-standards.flexiblelearning.net.au,. (2008). 2008 Emerging Technology Trials – Emerging Technology Trials – Funded Projects – Research – E-standards for Training. Retrieved 2 April 2015, from http://e-standards.flexiblelearning.net.au/research/funded_projects/emerging_technology_trials/2008_emerging_technology_trials.php
Gates, B., & Hemingway, C. (1999). Business @ the speed of thought. New York, NY: Warner Books.
Johnson, L., Adams Becker, S., Estrada, V., Freeman, A. (2015). NMC Horizon Report: 2014 Higher Education Edition. Austin, Texas: The New Media Consortium.
Kellogg, B., Parks, A., Gollakota, S., Smith, J. R., and Wetherall, D. (2014) Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices, University of Washington, retrieved from: http://iotwifi.cs.washington.edu/files/wifiBackscatter.pdf
Kellmereit, D. and Obodovski, D. (2013) The Silent Intelligence: The Internet of Things. DnD Ventures 1st edition, California.
Kortuem, G., Bandara, A., Smith, N., Richards, M., & Petre, M. (2013). Educating the Internet-of-Things Generation. Computer, 46(2), 53-61. doi:10.1109/mc.2012.390
Lai, H., Chang, C., Wen-Shiane, L., Fan, Y., & Wu, Y. (2013). The implementation of mobile learning in outdoor education: Application of QR codes. Br J Educ Technol, 44(2), E57-E62. doi:10.1111/j.1467-8535.2012.01343.x
Lytx,. (2015). DriveCam Driver Monitoring & Fleet Tracking System. Retrieved 18 April 2015, from http://www.lytx.com/our-solutions/drivecam-programs
Mooreslaw.org,. (2015). Moore’s Law. Retrieved 17 April 2015, from http://www.mooreslaw.org/
Raspberrypi.org,. (2015). Raspberry Pi. Retrieved 16 April 2015, from https://www.raspberrypi.org/
The internet of things,. (2015). The internet of things | Are you ready for the Internet of Things?. Retrieved 11 April 2015, from http://www.theinternetofthings.eu/