A Proposed Model for Using Cloud Computing and Web2.0 in Deploying E-Learning Ecosystem (ELES)

2013 ◽  
Vol 3 (4) ◽  
pp. 51-80 ◽  
Author(s):  
Yehia Helmy ◽  
Mona Nasr ◽  
Shimaa Ouf

Research community has believed that an e-learning ecosystem is the next generation of e-learning but has faced challenges in optimizing resource allocations, dealing with dynamic demands on getting information and knowledge anywhere and anytime, handling rapid storage growth requirements, cost controlling and greater flexibility. So, flourish, growing, scalable, available, up to date and strong infrastructure e-learning ecosystems in a productive and cost effective way will be needed to face challenges and rapidly changing in learning environment. This paper work focused on an e-learning ecosystem (ELES) which supports new technologies is introduced and implemented. An integration between cloud computing and Web 2.0 technologies and services used to support the development of e-learning ecosystems. Cloud computing an adaptable technology for many of the universities with its dynamic scalability and usage of virtualized resources as a service through the Internet and Web 2.0 brings new instruments help building dynamic e-learning ecosystem on the web.

2013 ◽  
Vol 4 (3) ◽  
pp. 52-65
Author(s):  
Rabindra Ku Jena

Recent advances in Information and Communication Technology (ICT) provide an opportunity to build a self growing and sharing virtual environment for teaching and learning. Cloud computing is one of the latest technological advancement in ICT domain. Cloud computing technologies have changed the way applications are developed and accessed. A Virtual Learning Environment (VLE) is a system for delivering learning materials to students via the web. Cloud computing is provides one of the most emerging cost effective solution for virtual learning and teaching environment. This paper discusses how cloud computing has been contributing to virtual learning environment and an overview of the current state of the structure of Cloud Computing based e-learning is discussed. The readers will also find a brief overview of cloud computing and the different efficient cloud based virtual learning models. Towards the end different offers from different cloud vendors are discussed.


Author(s):  
Bo Dong ◽  
Qinghua Zheng ◽  
Jie Yang ◽  
Haifei Li ◽  
Mu Qiao

Author(s):  
Jawaher Ahmed Mohammed AL Busaidi ◽  
Muhammad Hayat

With the advent of new technologies, companies and academic institutions are striving to keep pace with the advancement in Information and Communication Technologies and to streamline the way to manage or upgrade their IT resources. Cloud Computing provides an alternative solution to achieve these objectives within budget. A number of colleges and universities all over the world are implementing cloud infrastructure to reduce the IT operational cost and increasing the effectiveness and convenience of educational services. Cloud computing can play an important role in the education sector in providing ubiquitous access (anytime, anywhere, independent of device) to the learning material. This approach provides a new way to design and manage IT resources in an efficient manner not only by increasing the user’s productivity and hardware utilization but also decreasing infrastructure cost through virtualization. This research paper presents a smart e-learning system based on cloud platform in delivering and sharing e-learning resources. The authors also discuss the features of the smart E-Learning system over the traditional system and propose architecture of smart e-learning system for the education institutions.


2014 ◽  
Vol 4 (4) ◽  
pp. 7-31 ◽  
Author(s):  
Anna Goy ◽  
Giovanna Petrone ◽  
Marino Segnan

The interaction between users and digital devices has deeply changed in the last decades. In particular, the so called desktop metaphor relied on assumptions which have been modified by the rise of new paradigms, such as Web 2.0 and Cloud Computing. This paper discusses the limits of the desktop metaphor and proposes a new interaction model, TablePlusPlus (T++), aimed at providing Web and Cloud users with interaction mechanisms fulfilling their needs, i.e., the possibility of handling activity contexts, collaborating with other users, and homogeneously managing heterogeneous objects. T++ tables provide a context-based environment which enables a homogeneous treatment of heterogeneous content items, enhanced by a table-level annotation mechanism supporting an abstract view over resources, which is missing in standard current desktop and collaborative environments. In order to evaluate the effectiveness of the proposed model, this work developed a prototype and tested it in two controlled experiments, whose results are definitely encouraging.


Author(s):  
Daniel Viney

This chapter discusses ICT trends of the past decade, the emergence of Web 2.0 technologies, mobile computing (as distinguished from cloud computing), the pitfalls of social networking, security considerations in the workplace, copyright and Intellectual Property considerations, and how to best control threats and vulnerabilities. We are in a period of aggressive technological growth to which there is no foreseeable end. New technologies, such as Web 2.0 and cloud computing, are emerging at an exponential rate, and as a consequence, security threats, controls, and standards are iteratively evolving. As yet, we do not know the security and privacy implications that such a rapid and wide uptake of cloud computing, and other multi-user virtual environment initiatives, and Web 2.0 technologies, will bring. In no way is this cause to panic, instead it is cause to focus on self-education, employee-education, and awareness. To put it simply, these offer our best defense to security threats. By being educated, aware, and vigilant, the majority of threats are nullified, as they are designed to prey upon those who rely on trust when reading emails, visiting Websites, and accessing site content, when navigating the World Wide Web. For example, there are millions of users who are completely unaware of threats, such as phishing, and other forms of Internet-based fraud. More than ever before, the onus is on the individual, both at home and in the workplace, to be responsible for maintaining best practice techniques, while utilizing digital resources to ensure that information security, individual privacy, and applicable legislation are not breached. This can only be achieved through iterative education processes, general awareness, and vigilance.


Sign in / Sign up

Export Citation Format

Share Document