reflections in response to Emerging Technology course EDUC 7108

Archive for the ‘Module Two’ Category

Module Two: Emerging Technology Tetrad

Cloud computing is a metaphor for the internet, referring to web-based applications which allow users access to their information from work, home, school, or any remote location, so long as they have access to the internet.  Since “information “sits” on a cloud in a centralized location which can easily be retrieved, cloud computing not only changes how we store and retrieve applications and files, but also how we communicate and share them with other members of our group, and how organizations restructure and modernize their IT infrastructure” (Hirsch, 2010).

Cloud computing enhances collaboration:  among colleagues, in classrooms, to provide a forum for projects of all types.  By working on a network, the information created on isolated personal computers  can be collectively manipulated by remote users, as is the case with a program such as Google Docs, or posted and responded to as with a blog or wiki (Owen, 2010).

Cloud computing obsoletes the limitations of physical space, whether it be on a computer, or in a flash drive.  Expensive programs become obsolete such as the Microsoft Office suite.  Copyright and intellectual property laws and infringements are also becoming obsolete as a result of socially constructed work.

Computing on the cloud also rekindles a sense of commonwealth, a social concept from the past in which the work of one or some is used for the improvement of all.  We also regain a sense of control over our media input that was lost by these same technologies (Saunter, 2010), as we consider the implications of using RSS feeds in each person is “fed” the information source of his or her own choice.  Operating systems are freed for open access, and owners of computer and smartphone are given greater manipulative power over the apps chosen for their devices.

The disadvantages which will reverse cloud computing include issues with loss of privacy, and lack of security.


  • collaboration among colleagues, and in classrooms
  • collectively manipulate texts using programs such as Google Docs
  • post and respond asynchronously using blog or wiki

  • limitations of physical space: on a computer, or in a flash drive
  • expensive programs such as the Microsoft Office suite.
  • Copyright and intellectual property laws and infringements
Rekindles from

the past

  • a sense of commonwealth
  • a sense of control over our media input as users choose the information sources of one’s choice (RSS feeds & applications)


  • loss of privacy
  • lack of security


Cloud Computing Tetrad Cloud Computing Tetrad

Hirsch, O. (2010). Technology education: Emerging and future technologies.  Retrieved from

Johnson, L., Levine, A., Smith, R., & Stone, S. (2010).The 2010 horizon report. Austin, Texas: The New Media Consortium.

Owen, W. (2010). Mady by Many: Cloud culture, the internet wars, and sublimation of self. Retrieved from

Saunter, T. (2010). Digital cortex: Applying mcLuhan. Retrieved from