Thursday, November 11, 2010

Unit 7, Article 34: Iran’s Twitter Revolution? Maybe Not Yet


Reference:

Schectman, J. (2009). Iran’s twitter revolution? Maybe not yet: Some Iranian election protesters used Twitter to get people on the streets, but most of the organizing happened the old-fashioned way. In P. De Palma (Ed.), Annual editions: Computers in society 10/11 (pp. 154-155). New York: McGraw Hill.

Summary:

This 2009 article talks about what media has been referring to as a “Twitter Revolution” in Iran. The author points out that while Twitter has been used to a small extent in Iran, most of the revolution, which consisted of protests in the streets, was organized by people going door to door, making phone calls, and sending SMS messages on their cell phones. There are just over 8,500 Twitter users whose profiles indicate they are from Iran – not enough to form the kind of protests that took place. Moreover, the Iranian government blocked Twitter so the actual number of users that took the effort to get around the blockage are probably not that big.

The reason why it seems like a Twitter revolution from the outside is that most of the information that the international media has been able to get about what is happening in Iran has come through Twitter. There are some people on the ground in Iran who have been able to send messages. Their messages are not necessarily intended for other Twitter users in Iran, but intended for the international media to get a hold of. The fact that they are using Twitter makes a nice story, and so does the content of the Tweets.

Reaction:

Twitter is an interesting concept for me. While I have never used it, I can see the advantages it has for social networking and distribution of small pieces of information. People who want to publish information about themselves or any topic of their choice can do so from their mobile phones – they do not even need access to a computer. The concept of a Twitter revolution is interesting to me. I agree with the author that there would not be enough people using Twitter to actually organize a revolution. I don’t even think there are enough people in the U.S. on Twitter to organize something to the scale of a revolution. I can see the advantages of Twitter for getting information into the media.

From an educational standpoint, I think this is a great lesson for students in believing what the media is telling us or looking deeper at the research behind popular ideas. I had heard rumors about Twitter revolutions in third-world countries before I read this article. However, after looking at the research of how many users in the country were account holders, I find it hard to believe that any country is having a “Twitter Revolution”. It is more likely that it is being used by a few people on the ground to get the word out to the rest of the world.

Wednesday, November 10, 2010

Unit 6, Article 26: A Growing Watch List: Data from both U.S. citizens and foreigners flow from a massive clearinghouse.


Reference:

De Young, K. (2007). A growing watch list: Data on both U.S. citizens and foreigners flow from a massive clearinghouse. In P. De Palma (Ed.), Annual editions: Computers in society 10/11 (pp. 121-122). New York: McGraw Hill.

Summary:

This brief article talks about how technology is being used to compile and manage a database of people, both foreign and U.S. citizens, who may pose a terrorist threat to the United States. The database is called TIDE, Terrorist Identities Datamart Environment. The list is stored securely by the federal government and parts of the data are shared, on a need-to-know basis with law enforcement officers, border patrol, airlines, and others whose job it is to keep the U.S. secure. The list is populated by bits and pieces of information that are sent to TIDE by various intelligence agencies both inside the U.S. and abroad. Information is screened by TIDE management; often the pieces of information are incomplete and vague - sometimes even incorrect.

Incorrect and/or vague information is one of the problems with the TIDE database. Information in the database can cause people to be detained at airports, banned from flying, and in some cases taken to prison. If someone is unfortunate enough to have the same name as a person in the TIDE database, they will continuously be delayed and searched at airports. Generally, there is nothing a person can do about this but carry a letter alerting airport authorities that authorities will have to call TSA to verify the person’s identity.

Reaction:

I found this article to be very interesting. The TIDE database makes a lot of sense from a national security standpoint, but it is too bad it cannot be more accurate. I have to have faith that the managers TIDE are trying their hardest to keep the data organized and accurate in the best interest of the country. I would rather be searched every time I get on an airplane or cross a boarder than worry about possible security threats every time I fly, but I see how it could make some people extremely upset.

I can also see how this may be a big problem for international students, foreigners, and people who come from countries where everyone has similar names. For people who do not understand English well, it could be very scary to be searched and interviewed in the airport. It would be a horrible welcome to America. I just hope the security personnel, law enforcement, and border patrol officers who screen people are good representatives of America as they go about their interactions with people.

Tuesday, November 9, 2010

Unit 5, Article 24: Wikipedia in the Newsroom

Reference

Shaw, D. (2008). Wikipedia in the newsroom: While the line “according to Wikipedia” pops up occasionally in news stories, it’s relatively rare to see the user-created online encyclopedia cited as a source. But some journalists find it very valuable as a road map to troves of valuable information. In P. De Palma (Ed.), Annual editions: Computers in society 10/11 (pp. 108-110). New York: McGraw Hill.

Summary

This article, which was written for American Journalism Review, talks about varying viewpoints of the use of Wikipedia by journalists. Wikipedia is an online encyclopedia that can be edited by anyone with internet access. Erroneous edits can be deleted by Wikipedia staff, but not everything is caught which means that the information found in Wikipedia is not necessarily accurate. According to the article, most journalists do not see Wikipedia as a viable source for information. Some journalists, however, agree that Wikipedia is a great place to go to find ideas. Many articles are full of good information and liked to credible sources.

Most often, when Wikipedia is cited by someone as a source it is because the user does not fully understand Wikipedia. Wikipedia is open about the fact that the information found inside is not necessarily accurate. Their online disclaimer includes the words “please be advised that nothing found here has necessarily been reviewed by people with the expertise required to provide you with complete, accurate or reliable information”. Students often cite Wikipedia when they write because it is the first thing that comes up in the search engine. Likewise, reporters who have never heard of the source may use it erroneously.

Reaction

Wikipedia is full of interesting information and often very helpful when trying to find quick facts about a new idea or concept. I agree with the article that Wikipedia can be a great place to start when researching. It presents a wealth of ideas and information that can then be researched further and confirmed. I also think Wikipedia can be very tempting for students who are just beginning to learn how to research. ESL students that I have worked with in the past have copied and pasted information from Wikipedia because they didn’t know how to express what they wanted to say in English. I think it is important that instructors address proper use of Wikipedia in their classrooms. Many instructors ask their students not to use Wikipedia as a source at all. I think it would be great if more instructors could teach students how to use Wikipedia as a source for finding credible information that they can cite in their papers. Going to Wikipedia is kind of like asking people you know about a topic before you start researching it. They may give you incorrect facts, but they will probably be able to help steer you in the right direction and give you some things to think about that you hadn’t thought of on your own.

Monday, November 8, 2010

Unit 3, Article 8: National ID: Biometrics Pinned to Social Security Cards

Reference

Singel, R. (2007). National ID: Biometrics pinned to social security cards. In P. De Palma (Ed.), Annual Editions: Computers in Society 10/11 (pp. 40-41). New York: McGraw Hill.

Summary

This article was written in May of 2007 about two immigration reform proposals that were before Congress at the time; the article was published in Wired magazine. The goal of the immigration reforms was to make it easier for employers to identify whether applicants were eligible for employment by improving diver’s licenses and social security cards. The proposed bill would have also severely limited the documents that employees could present to verify their citizenship. A major part of the proposal was to add some type of biometrics to social security cards. Biometrics could include a photo ID, fingerprint, or even an iris scan. Social security cards could even be scanned with a special program on laptop computers to immediately verify people against federal databases. Some people were concerned that if the social security card did become the only card that could be used for employment and if the card could be scanned and compared to a federal database, that we would be creating a new set of problems. Some are worried that mistakes in the federal databases – 17.8 million inaccuracies were know at the time of this articles publication – would prevent some people from getting a job who should rightfully have one. People are also concerned that turning the social security card into a national ID card could lead to widespread document checks and be taken advantage of by more than just employers.

Reaction

Since this article is from 2007, I don’t find it extremely useful in 2010. Since social security cards have not changed since this article, I assume that the proposal did not pass congress. Other articles that I have read have also talked about the need for some type of national ID: something that could be used both online and off-line and would be hard for identity thieves to steal. I assume that some type of new ID system is coming soon to the United States. I also think it would be a great idea (from the national security perspective) to include some type of biometrics in the ID because it would make the ID harder to seal or replicate. I personally feel uncomfortable with so much of my information being stored online and in databases around the country and the world. When I have traveled internationally, I have been fingerprinted and scanned; I wonder who is keeping all of this data about me. How secure is it? I understand that it is my choice to travel. Therefore, I must choose to be scanned and printed or turn around and go home. However, I am not sure I am ready for the federal government to require that I give them biometric information just to live here in my own country.

Saturday, November 6, 2010

Unit 8, Article 39: Google and the Wisdom of Clouds: A lofty new strategy aims to put incredible computing power in the hands of many.

Reference

Baker, S. (2007). Google and the wisdom of clouds: A lofty new strategy aims to put incredible computing power in the hands of many. In P. De Palma (Ed.), Annual Editions: Computers in Society 10/11 (pp. 181-185). New York: McGraw Hill.

Summary

Cloud computing is a relatively new concept. Clouds are giant clusters of machines that are all working together over the internet; a cluster could consist of 100 computers or 1,000 – depending on the job that needs done. Clusters of computers working together are powerful because they can handle jobs that one machine would just get bogged down in – and they can handle these jobs with great speed. Clusters are also great because they evolve with changing technology; as each machine in a cluster gets old or breaks, engineers replace single machines one at a time without affecting the ability of the cloud to continue processing data.

Google, with its massive search engines and other applications has learned to leverage cloud computing very effectively. Their algorithms and strategy are largely kept a secret from outsiders since Google’s ability to use cloud computing is a major part of the company’s success. This article talks about one employee at Google, Basciglia, that recognized a need to train college students on the concepts of cloud computing. Basciglia developed a course known as Google 101 to train college students at University of Washington on the concepts of cloud computing. The course was hugely popular and has now spread to other universities. Since the Google cloud is not available to the public, university students have begun to develop a cloud of their own machines where they learn how to develop algorithms and programs that leverage the power of cloud computing. Many of the students who take the Google 101 course have gotten jobs working for Google or other large companies such as IBM after graduation.

Reaction

This article talks about the huge power that we have in the web at this point in time and suggests that in the future we will look back and think that our current concept of the web is “tiny” compared to what it will be able to do in the future. I believe that this is true. The rate at which the volume of information on the internet has grown over the past 10 years is astonishing. Now, more and more people are putting information into the web, not only to we create websites, but each time we click on a link we contribute our choice is saved on a server somewhere which contributes to the vast amount of data that can be accessed via the web. I think the future of the web is both exciting and scary. I am not sure how I feel about other people being able to obtain so much information about me by monitoring what I do online, what I write in my emails, and what other people write or post about me. I am glad that there is not universal ID that I use every time I log into a computer. This, at least, provides some anonymity, but I know that information about most of my life can be found on the servers that don’t belong to me. The web is exciting, though, because of all that we can use it for. All of the data online is great for research and brings a new era to teaching and learning.

Tuesday, October 26, 2010

Unit7, Article 33: New Tech, Old Habits: Despite world class IT networks, Japanese and Korean workers are still chained to their desks.

Reaction:

Ihlwan, M., & Hall, K. (2007). New tech, old habits; Despite world-class IT networks, Japanese and Korean workers are still chained to their desks. . In P. De Palma (Ed.), Annual editions: Computers in society 10/11 (pp. 152-153). New York: McGraw Hill.

Summary:

In New Tech, Old Habits, Ihlwan and Hall briefly describe trends of telecommuting in Japan and Korea vs. the United States. They make the point that Japan and Korea have some of the best wireless and broadband networks in the world and then ask the question: are Japanese and Korean companies using this networking technology to their best advantage? Their answer is that these companies are not utilizing networks nearly as much as they could. Most, but not all, companies in Japan and Korea do not allow their employees to work from home or even to bring a laptop computer home when they need to work late. Reasons for this decision include a cultural expectation for workers in Asian companies to work together, face to face, on projects and a fear that many company executives have that their employees might lose valuable data if they take computers with them out of the office. According to the article, trends show that telecommuting in Japan and Korea may be on the rise as younger managers take over positions and companies find out how much money telecommuting can save them in overhead costs.

Reaction:

I do not find it surprising that Japanese and Korean companies are more hesitant to allow their employees to telecommute than American companies are. Their cultures are more formal and telecommuting (at least in America) seems like a more relaxed and informal way of doing business. Telecommuting is also much more individualized than Japanese and Korean companies may be used to. When telecommuting, employees are evaluated based on the amount of work and the quality of work that they are able to do, whereas in Japanese and Korean companies the time commitment make by employees for the company may be of more value to managers.

Monday, October 25, 2010

Unit 6, Article 29: Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook

Reference:

Garfinkel, S. (2009). Privacy requires security, not abstinence: Protecting an inalienable right in the age of facebook. In P. De Palma (Ed.), Annual editions, Computers in society 10/11 (pp. 128-133). New York: McGraw Hill.

Summary:

The author of this article is Simson Garfinkel, associate professor at the naval postgraduate school in Monterey, CA. In the article, the author expresses his views about the state of privacy Americans have as a result of modern technologies such as the computer, internet, and databases. As eluded to in the title, Garfinkel points out that whereas Americans could at one time abstain from letting others have too much of their personal information by paying in cash, having conversations face to face rather than over the phone, or driving a personal vehicle instead of flying, we are now faced with security cameras, online medical records, online bank records, and other similar things that make it impossible to live life apart from the web. All of us have personal information online; the question becomes not whether to abstain from technology or not, but how to make the systems we do use as secure as possible.

Garfinkel spends a majority of his article outlining the history of privacy acts in the United States. Basically, where privacy stands right now is that each online company or website that takes a user’s personal information is required to provide a privacy policy for users defining what that site can and can’t do with the user’s information. A company would only get in trouble if it used personal information in a way that violated its own policy.

Garfinkel points out that while the privacy laws that we have now are working out OK, there are still a lot of holes that we need to patch up in our system. One major problem with the internet is that there is no way of knowing when a person is really who they say they are. For example, if someone were to hack into your Gmail account and then change the password and settings so that you could not get back in – how would you prove that it was actually your account in the first place? Would you be able to get it back? Once they got into your account, they would have quite a bit of personal information about you including, most likely, passwords that had been emailed to you from other sites you use to do business online. Garfinkel is hoping that someday soon we can have an online security profile similar to that of a US passport – one identity that allows a person to sign into all of their sites online. He is hoping that a system like this would help prevent against most of the online identification problems that we are facing. A system like this, however, will cost quite a bit of money and will mean the government needs to make some big decisions about the policy surrounding it.

Reaction:

Reading this article reminded me that I should be more careful when entering my personal information online. A agree with the author that it is better for us to be online and aware of the potential privacy issues than to abstain from using the internet and/or modern technology and be marginalized by society. As consumers of technology we need to be careful of how we use it, what information we publish about ourselves online, and take purposeful steps to be informed about potential threats. I am not sure what I think about having a “digital passport” issued by the government for every person. While it would make it simpler to sign into websites and applications with just one ID, I’m not sure I want the government having the ability to track everything I do online. Having a universal, government-issued ID seems like it would protect my privacy in some ways, but violate it in others. Right now, someone can type in my passport number and see when I have left the country, where I went, and when I returned. What if someone could type in my online ID # and see what time I logged into my Facebook account, how often I check my online baking, and if I have ever used an online dating service?

Sunday, October 24, 2010

Unit 5, Article 23: Archiving Writers’ Work in the Age of Email

Reference:

Kolowich, S. (2009). Archiving writers’ work in the age of e-mail. In P. De Palma (Ed.), Annual editions: Computers in sodity (pp. 105-107). New York: McGraw Hill.

Summary:

In this brief article Steve Kolowich describes some of the challenges that archivists are facing as data turns digital. For many years, the processes used by archivists for preserving data have been pretty much the same. They receive paper manuscripts from authors, they preserve the paper, and they keep the information organized and catalogued in a way that makes it easy for researchers to find information they are looking for. Now, as writers have begun to write on the computer and save their work electronically, archivists are challenged with designing a new system that preserves electronic data and keeps is in a format that is accessible as technology rapidly changes.

Archivists are also facing questions about ownership. For data that has been stored by someone on his or her computer hard drive or their personal floppy disks, it is easy to specify ownership. If an author or author’s family decides to donate her works to a library, they can give the library a laptop computer or a box of floppy disks. However, it is not clear how who owns much of the information that has been posted online. If an author created a blog or communicated frequently with colleagues via email or facebook messages the data might belong to the author or it may belong to the company that owns the servers where the data is being kept.

The author summarizes his article by pointing out that so far we have no manual on how to properly archive an author’s work in the present day. No one is sure how much information to keep, what the best way is to store the data, or where the funds will come from for reference libraries to purchase the new technology that will be necessary. The good news is that we have access to so much great technology and resources that it should not be too difficult to figure out a process.

Reaction:

I found this article interesting because it brought up topics that I have never considered before. The computer does give us a tremendous ability to store data about someone’s life and the opportunity to learn about what a person did on the computer from day to day. The computer stores so much information about us that it seems to me like it could be an invasion of someone’s privacy to look too deeply even after they are gone. Before the digital age, an author had a choice about which of their writings they wanted to be published and which they wanted to keep secrete. They had the power to throw a stack of old letters in the fire or to rip them up and throw them out. Now, most of a person’s correspondence done online by email, chat or social networking sites and stored on serves that they do not own. I suppose it is an exciting concept for scholars and researchers who want to have access to as much information as possible, but I can’t help but feeling like we are invading people’s privacy by tapping into their browser histories, email, and other life online.

Friday, October 22, 2010

Unit 4, Article 13: Is Google Making Us Stupid?

Reference:

Carr, N. (2008). Is Google making us stupid? What the internet is doing to our brains. . In P. De Palma (Ed.), Annual editions: Computers in society (pp. 59-62). New York: McGraw Hill.

Summary:

The main point of this article is that using the internet and search engines is changing the way people think and process information. The author, Nicholas Carr, believes that as a result of using the internet, he has a shorter attention span and prefers to seek information by skimming quickly over the results that pop up on a search engine rather than by reading a lengthy article on the subject. He claims that he was once a “voracious” book reader, but now starts loosing attention and falling asleep after two or three pages of text. The author also sites other people who claim to be having the same shift in the way that they think as a result of spending a lot of time around the computer.
Using search engines and the web to find information is not a bad thing in and of itself; the author is concerned that the way we seek information is actually changing the way our brains work and the way our culture values knowledge. Rather than spending the time to read deeply the writings of any one author, we are skimming the works of hundreds of authors and only getting the main point of what each are saying. Our concept of knowledge is shifting from one of depth to breadth.

Reaction:

I agree with the author’s observation that media is causing people to change the way they prefer to get information. However, I do not think all of this started with Google. I think that newspapers, magazines, and TV have also played a part. People were channel-surfing on TV before they were surfing the net with their computer. I also think the author is correct in suggesting that people need to cultivate the habit of thinking about things critically and learning about a topic deeply rather than always finding quick and easy information online.

Sunday, October 17, 2010

Unit 3, Article 11: How Deep Can You Probe?

Zeidner, R. (2007). How deep can you probe? May employers are going online to check out job candidtaes. But does the practice carry hidden risks?. In P. De Palma (Ed.), Annual editions: Computers in society (pp. 49-51). New York: Mc Graw Hill.

Summary:

This article was published for the Society for Human Resources Management (SHRM) 2007 annual conference. The author, Rita Zeidner, talks about a practice that has become more and more common for HR departments and recruiters: checking into a potential candidate online before offering them a job. According to the 2007 article, about 20% of employers have eliminated a potential candidate because of information that they found online.

For some employers, it doesn’t seem like a big deal to research potential candidates online through web searches and/or social networking sites, but for others this practice is a huge breech of privacy. Employers who intend to do a criminal background check on potential hires are required to notify the person first, so should it be required that an employer notify a person before looking into them online. Information found online can be untrue and misleading. According to the sites’ terms of use, using social network sites such as MySpace and Facebook for commercial purposes may also be illegal.

The author concludes her article by pointing out that there are many ways that technology can be used legally by HR professionals and employers. Currently, online background checks are becoming more assessable and reducing the amount of time a company has to wait to get back results. There is also software being developed that can help HR professionals to quickly and efficiently do a background check, email references, and tabulate the results.

Reaction:

Personally, I feel that whatever a person publishes about themselves online is there for others to use as they wish. If you hire a person to work for and represent your company, you want them to be representing themselves in a respectable way the rest of the time. People need to realize that what they post online and on social networking sites is public information. They are marketing themselves by the way they appear online.

However, I also think that employers are responsible for making sure that the content they find online was actually posted there by the applicant themselves. There are a lot of people online with the same names, and it is easy for someone to create a false profile on behalf of someone else. When it is applicable to the job, employers should have the right to check into an applicant’s online activities as long as they let the applicant know beforehand. Applicants should have the opportunity to explain which online content they posted themselves and what may not be theirs.

Thursday, October 14, 2010

Unit 2, Article 5: Great Wall of Facebook: The Social Network’s Plan to Dominate the Internet – and Keep Google Out

Vogelstein, F. (2009). Great wall of Facebook: the social network’s plan to dominate the internet – and keep Google out. In P. DePalma (Ed.), Annual Editions: Computers in Society (pp. 24-27). New York: McGraw Hill.

Summary:

This article was written by Fred Vogelstein and published in the July 2009 edition of Weird. The article discusses the history of two companies that have risen up in recent years to be huge presences on the World Wide Web. The two companies, Google and Facebook, are both extremely popular online destinations for web users which means that they have the capacity to generate quite a lot of profit through advertizing if they can just figure out the best way to do it. The two companies are currently racing to be the first to take over the online advertizing market and doing so in slightly different ways.

Google has been around for longer than facebook and is currently a larger company with a much larger profit margin. Google works by sending out “crawlers” over the web to bring back information. The crawlers assemble the information in Google’s servers. Google can then use the information collected for its search engines and to target advertizing to its users.

Facebook has its own servers which it has blocked so that the Google crawlers cannot access the information. Therefore, all the personal information that Facebook users have put into Facebook remains in the Facebook servers. Facebook can then use this personal information to target advertizing specifically to its users. This is the “Great Wall” of Facebook that Vogelstein refers to in his title.

One of the main points of the article is that the two companies are fighting to dominate the World Wide Web. Whichever company can gather the most information about the web’s users and figure out the most effective way to those users will come out on top. In time, we will find out who the winner will be.

Reaction:

I chose to read this article because I was surprised by the idea that Facebook would be trying to dominate the Internet. I see Facebook as an important part of my experience online – it is fun and entertaining – a good way to connect with friends and local businesses. However, Google seems like a much more integral part of my online experience. With Google, I can find more information – I can do research, and I can find out what is going on in the rest of the world. Facebook is full of other people’s Facebook pages, but Google search gives me access to websites, blogs, images, videos, and so much more. Google also has many powerful applications that I enjoy using such as Google calendar, Google documents, etc.

From my point of view, the products of both companies are useful and can be used interchangeably and simultaneously. I view my Facebook account by using Google Chrome. However, this article makes it sound like ultimately it is going to be one company or the other that comes out on top. I don’t see why the Internet cannot be big enough for the two companies to coexist.

Tuesday, September 28, 2010

Unit 1, Article 1: Five Things We Need to Know about Technological Change

Reference

Neil, P. (1998). Five things we need to know about technological change. In P. De Palma (Ed.), Annual Editions: Computers in Society 10/11 (pp. 3-6). New York: McGraw Hill.


Summary:

The article, Five Things We Need to Know about Technological Change is a transcript of an address by Neil Postman to New Tech 98 Conference in Denver, Colorado. The theme of the conference was “The New Technologies and the Human Person: Communicating the Faith in the New Millennium”; in his address, Postman outlines five ideas about technology that he hopes will help his audience think about the relationship between technology and religious faith. The five ideas can be summarized as follows:

Idea #1: With all technological advances we gain some things, but we lose other things. One example that he gives of this is that with the internet we gain access to knowledge, but we may lose community.

Idea #2: New technologies are never distributed evenly among the whole population. Therefore, we have to ask who is benefiting from new technologies and who may be harmed.

Idea #3: New technologies bring with them new cultural ideas. For example, with the computer comes the idea that knowledge is valuable; this new cultural idea takes the place of an older culture where wisdom was valued.

Idea #4: As new technology is invented, it changes our entire world rather than simply adding a new thing to it.

Idea #5: New technologies are eventually taken for granted. People forget that life was once possible without them.

Postman concluded his address by challenging his audience to pay attention to the way we interact with new technologies; “we need to proceed with our eyes wide open so that we may use technology rather than be used by it” (Neil, 1998, p. 6).

Reaction:

Postman’s 1998 article is used at the opening chapter in the 2010/2011 edition of Computers in Society. The article is currently thirteen years old, however the five ideas about technological change that Postman list are still valid today. I was especially struck by idea #4, which states that technological change is ecological rather than additive. Technology is constantly changing and changing the culture in which we live. As a teacher, it is important to remember that the students in our classrooms may not have had the same history with technology that we have. The way that each of us interacts with technology affects how we think, act, and learn.