Implications Of The Cloud In The Classroom

Implications Of The Cloud In The Classroom

Implications Of The Cloud In The Classroom

Cloud computing has been exciting people with its implications and opportunities especially so over the past several years, as more and more of the public have been exposed to the potential of this technology. While many people’s first experiences with cloud computing have revolved primarily around the digital sharing of music and video media, these same applications for cloud computing carry significant implications outside of the entertainment field. The classroom has become a major test lab for cloud computing and its potential to revolutionize educational, social, and economic systems that exist in society today. As more and more urban school districts continue to search for answers to stagnant test scores and high drop-out rates, cloud computing-powered classrooms have become the Holy Grail of most principals’ wish lists. While the obvious costs associated with the technological infrastructure needed to accomplish making this technology widely available, cloud computing remains a hypothetical solution in the minds of many teachers. However, as urban districts pump more and more money into upgrading their infrastructure and bringing cloud computing to every high school class, it is worth taking a look at the potential repercussions to academics as we know it. Three big questions that remain currently:

Aren’t teenagers already too distracted by technology?distraction-cloud

It really depends on who you ask. First, we need to rule out teenagers, who would certainly support the ability to bring their laptop, iPad, or smartphone to class to use. However, as any teacher working in a tech-heavy school can tell you, no manner of great lessons or interesting subject material can prevent the obvious teenage wandering to Facebook, Twitter, or the rest of the web. One thing that teachers have been clamoring for from tech manufacturers and software developers alike has been an intuitive education management system, which allows for functions like automatic screenshots and remote desktop controls. By giving the teacher the ability to monitor, control, and more importantly limit students’ ability to search specific sites or go off-task, cloud computing becomes a much more effective classroom tool, and much less of a potential distraction disaster.

Why would students need Google Drive and other cloud-based workplace collaboration software?

For the exact same reason professionals use it! From sharing documents and resources among each other during group projects, to being able to meet with a teacher and go over revisions remotely, to revision tracking and other important elements of teaching the editing process, the potential for cloud computing in the classroom is essentially limitless. And that’s just an English classroom. From Google Forms being used for everything from daily homework and class surveys, to Google Earth being used as the framework and platform for opening unit lectures, new educational uses for cloud computing tools are emerging at an incredible rate.

What tech company will become the preferred choice for educational cloud computing enthusiasts?

Currently, it is Google, Google, Google, and Google. While tech giants like Microsoft, Apple, and others continue to take swings and challenge the “Don’t Be Evil” giant, Google has made remarkable inroads into education policy and tech-for-the-classroom, far more so than its usual rivals. Urban districts around the country, which sit on tens of millions of dollars in funding for technology purchases and equipment, are being courted actively by Google for everything from software licenses, to free support for Google cloud services, to Chromebooks that can be bought cheaply and in mass numbers for entire classes and grade levels of students. While it is a sure bet that once other tech giants get wind of the money at play in this market sector they will make plays themselves, at the moment the standard for cloud computing in education is being set by Google.

By Adam Hausman

(Image Source: Shutterstock)

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…