Free Essay

How Mobile Computing Has Changed Training

In:

Submitted By tami1194
Words 729
Pages 3
How Mobile Computing has Changed Training
John R. Jones
Ashford University – INF103
Instructor: Mark Johnson

How Mobile Computing has Changed Training
The growth of mobile technologies has created numerous opportunities for learning and training development. Because mobile learning or mLearning allows for immediate access to materials, instantly collaborating on and discussing content enhances the learning experience. mLearning can also be used with other modalities to enhance on the job training, providing the learner with just-in-time tools and references.
History of
Traditional training is conducted in a classroom style environment with a number of students being taught at the same time in one location. With the introduction of synchronous virtual training, students could be all over the country or world; sitting in their offices or home to complete training. However, the training is still conducted with all the students attending a class at the same time. Similar to what is used at Ashford University, asynchronous training allows the student to develop new skills on their own timeframe and at their own pace. “The evolution in education and training at a distance can be characterised as a move from dLearning (distance learning) to eLearning (electronic learning) to mLearning (mobile learning).” (Keegan, Desmond 2002)
Mobile training or mLearning allows a learner to use a mobile device to access training content, complete training modules or games and collaborate with classmates or peers. mLearning could be completed as a stand-alone, self-study course or as part of a larger curriculum of which mLearning is only a part. Mobile learning is the first stage of using the globalization of the internet use to the “next generation” of learning. (Keegan, Desmond 2002)
Mobile Technologies
Mobile technologies continue to evolve with new tools, software and hardware being developed constantly. When it comes to hardware, Mark Bowles explains in Introduction to Digital Literacy, mobile computing began with laptops, netbooks and Ultrabooks; and then moved on to mobile phones, smart cards, GPS, and augmented reality. (Bowles, 2013). With each expanding iteration of hardware mobility, additional opportunities for mLearning are created. In the recent past, students evolved from taking notes on paper to typing notes into a laptop. That has evolved into taking notes on a tablet or even on their smartphones.
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.
Last Name, F. M. (Year). Book Title. City Name: Publisher Name.

Footnotes
1[Add footnotes, if any, on their own page following references. For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of the sample Heading 2 paragraph on the first page of body content in this template.)]
Tables
Table 1
[Table Title] Column Head | Column Head | Column Head | Column Head | Column Head | Row Head | 123 | 123 | 123 | 123 | Row Head | 456 | 456 | 456 | 456 | Row Head | 789 | 789 | 789 | 789 | Row Head | 123 | 123 | 123 | 123 | Row Head | 456 | 456 | 456 | 456 | Row Head | 789 | 789 | 789 | 789 |
Note: [Place all tables for your paper in a tables section, following references (and, if applicable, footnotes). Start a new page for each table, include a table number and table title for each, as shown on this page. All explanatory text appears in a table note that follows the table, such as this one. Use the Table/Figure style, available on the Home tab, in the Styles gallery, to get the spacing between table and note. Tables in APA format can use single or 1.5 line spacing. Include a heading for every row and column, even if the content seems obvious. A default table style has been setup for this template that fits APA guidelines. To insert a table, on the Insert tab, click Table.]
Figures

Figure 1. [Include all figures in their own section, following references (and footnotes and tables, if applicable). Include a numbered caption for each figure. Use the Table/Figure style for easy spacing between figure and caption.]
For more information about all elements of APA formatting, please consult the APA Style Manual, 6th Edition.

Similar Documents

Premium Essay

Mobile Computing

...Running head: MOBILE COMPUTING AND SOCIAL NETWORKING CIS 500 Mobile Computing and Social Networking Dr. Ave K. Kludze, Jr Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now able to monitor their vital signs such as blood pressure, glucose levels, etc. without having to periodically visit a doctor’s office or hospital. Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s office or hospital. With the new information age, health care providers are expected to keep up with the new healthcare technologies, treatments, medications, and different procedures that are introduced to our consumers at a rapid pace. Traditional medical practices in the past have made this process almost impossible because the systems were unable to organize, store, and retrieve medical and patient information. But today's information systems have made the impossible possible. With new technology, come technical problems that will have both pros and cons in mobile computing technology for better and safer health care. Some problems include improving the quality of patient care and patient safety, preventing medical errors, reducing healthcare costs, helping patients manage their conditions better, and minimizing...

Words: 1425 - Pages: 6

Premium Essay

Mobile Technology

...would go mobile. With the emergence of new technology and people desiring to have technology at their fingertips, mobile computing has changed the way we interact with the world around us. While mobile technology provides the convenience of high availability and connectivity, these conveniences have also increased mobile device vulnerability to malicious attacks and threats. Many companies are providing mobile devices to employees in order to conduct business away from the office. This has proven to be major headache for IT professionals. Normally, IT professionals control network activity through vulnerability assessments, scans, audits, and security patches; unfortunately, the same does not hold true for mobile devices. Unlike wired network connections, mobile devices favor wireless internet connectivity and are constantly broadcasting for connection to a wireless network. Many hotels, restaurants, and airports offer free WI-FI to the public, unlike home or office networks, most public networks are not secure. It is tempting to utilize free connectivity to check email, however, these networks do not offer the level of encryption needed to conduct company business and employees should be advised to avoid unencrypted public wireless internet connectivity. Disabling Bluetooth wireless capability is another way to assist in protecting mobile devices from malicious attacks. Switching the Bluetooth access to the off position will prevent the mobile device from...

Words: 733 - Pages: 3

Premium Essay

Critical Issues

...their advantage when committing crimes; therefore law enforcement must also use technology when taking down the criminal. Technology can be used to prevent crimes as well as to solve crimes after they have happened. Law enforcement today is focusing more on the less then lethal weapons whenever possible. Police officers are faced with many dangers in their daily jobs. Police officers are constantly faced with the unknown and the unpredictable. A routine call could turn out to be deadly or contamination of infectious disease. The Internet has changed how police officers can complete their daily jobs; the Internet has opened doors to so many technological advancements and if all departments are updating their processes and up with technology their jobs could be much more adequate and less room for error or delays. Major technological advancements include database technology, computer aid dispatch, record keeping, and mobile computing. What was once known as the card file index is now known as databases or COMPSTAT, these databases hold criminal information, management information, reports that can be used for statistics or analytical information, trends in crimes, and also can be used for staffing based on geographic crime history. All of this information is at the fingertips of an officers or management personnel to quickly make a decision when necessary. Computer Aided Dispatch is much more efficient then dispatch verbally giving the officer the information allowing room...

Words: 3141 - Pages: 13

Premium Essay

Management

...Name Course Tutor Date of submission The assignment seeks to confirm how the in-memory computing can be effectively analyzing the business information in the context that requires little or no training at all. This effectively goes to the larger overview of how the context of technology can impact business strategies in conjunction with the organizational plan. 1. What was your final Score? How do you feel about that score? Did you go back and try a question again if you got it wrong? Which role did you like best? My final score is 890 points and I effectively attained the score and I feel good about them. I comfortably attained the score after failing once and repeated to attain the correct answer of 88 points. The role that I liked best was the post paid revenue (SUM). The figures accrued in 2010 were 7,601,640.2 and those for 2011 was 10,090,957.89. This helps to effectively express the customer usage analytic. 2. How can Rapid Comm. use this system to support new products and services that meet the needs of their customers? (b) Can Rapid Comm. use that knowledge to survive hyper competitive market places? The rapid communication uses the age analysis to generate the revenue in the context that seeks to employ and examines which age group generates the most revenue. In this context it brings the general overview of which group partakes in the contributing the most markets for their products. In this context it helps the company to it brings...

Words: 796 - Pages: 4

Premium Essay

Analysis of Hershey’s Enterprise System Cutover

...First off I would like to thank you for having the opportunity to discuss with you some of the issues your company is dealing with at this time. In this memo I hope to highlight certain issues pertaining to the cutover that was called “Enterprise 21”. There was an enormous amount of information that needed to be incorporated together in an enterprise resource planning endeavor. This cutover caused many issues at your company from logistics to customer satisfaction. With this memo I hope to convey a detailed assessment to prevent this from happening again. As the year 2000 was approaching Hershey’s saw that there was a need to update their information technology. Hershey was similar to other food distributors and did not spend much more than was needed on their information technology. As the year 2000 was impending Hershey saw the need to replace there current legacy system for a new ERP system that would integrate all areas of Hershey’s. Your vice president of information systems Rick Bentz began to modernize and update software and hardware in the early months of 1996. This project was named “Enterprise 21”. The goals of this project were to upgrade and standardizing the company's hardware, and moving from a mainframe-based network to a client-server environment. Bentz noted benchmark studies that show Hershey’s trailed industry peers spending on information technology. Bentz also noted that Hershey’s needed to be able to share its data more efficiently. Hershey's information...

Words: 1807 - Pages: 8

Premium Essay

Mobile Devices

... Technology Report E-Commerce - Online The history of business has been defined by advances in technology that have fundamentally changed the business playing field. The invention of the railroad, the motor vehicle, the airplane, and the internet revolutionized the business industry, changed the dynamics of how businesses compete, and brought economic prosperity for those who leveraged, adapted, and utilized the new technology. Smart Phones, Tablets, & other mobile devices are rapidly growing and are becoming common place around the world. Mobile devices will not only change the way we do business, it will revolutionize it. This technology will change business models, create revenue streams, and improve consumer’s lives. (Mcdermott, 2011) Mobile devices are heralding in this new revolution, changing the dynamics of business, and transforming how businesses operate and interact with consumers. Mobile computing consists of hand-held/mobile devices usually with a miniature keyboard, which allow users to instantly access information, instantly communicate with others, use applications to solve problems, or just relax and socialize with others while on the go. These devices generally consist of smart phones and tablet computers. Most mobile devices use touch screens, which allows the consumer to interact in a unique way with their device. The most important technology within mobile devices is the device’s operating system. Operating systems include Android...

Words: 3056 - Pages: 13

Premium Essay

Aceptable Use Policy

...ACCEPTABLE USE POLICY (AUP), v 1.4, 6 January 2012 Reference: AR 25-2 (Information Assurance). A well-protected DoD/Army network enables organizations to easily handle the increasing dependence on the Internet. For a DoD/Army organization to be successful, it needs to integrate information that is secure from all aspects of the organization. The purpose of this policy is to outline the acceptable use of computer equipment within a DoD/Army organization. These rules are in place to protect the employee and the organization. Inappropriate use exposes DoD/Army units to risks including attacks, compromise of network systems and services, and legal issues. This policy applies to all employees, contractors, consultants, temporary employees, and other workers assigned to the DoD/Army organizations. 1. Understanding. I understand that I have the primary responsibility to safeguard the information contained in the Secret Internet Protocol Router Network (SIPRNET) and/or Non-secure Internet Protocol Router Network (NIPRNET) from unauthorized or inadvertent use, modification, disclosure, destruction, and denial of service. 2. Access. Access to this network is for official use and authorized purposes and as set forth in DOD Directives 5500.7-R, Joint Ethics Regulation (JER), AR 25-2 (Information Assurance) and Army network policy and accreditation. 3. Revocability. Access to Army Information Systems resources is a revocable privilege and is subject to content monitoring and security testing...

Words: 3671 - Pages: 15

Premium Essay

Swot Analysis Of Bath Fittings

... the company benefits from the active development of the market with a growing number of skilled installers, which will help to establish the brand more firmly in the local market Grohe has been the pioneer of skill development initiatives in India in the field of plumbing. Having entered the Indian market about a decade back, Grohe has established itself as the number one international brand in the industry. The company has been growing at a CAGR of about 20% in the last 5 years and has notched up a revenue of about...

Words: 1547 - Pages: 7

Premium Essay

Six Trends

...The Change Technology Has Had On The Business World Crystal Saunders Kaplan University In the article called Six Technology Trends Revolutionizing The Hospitality Industry, (Calum McIndoe, May 13, 2013). McIndoe spoke on how technology has changed multiple areas in the hospitality industry. One believe at the end of this article you will find it quite intriguing. This paper will be speaking about how it may be hard for hospitality providers to keep up with the change technology is having on the industry. “As well as the effect it is having on the cloud software, the two main factors that are behind the change in the software, and a couple of other very intriguing facts” said McIndoe. At the end of this assignment one truly hope that the article was thoroughly broke down so that everyone can understand all the facts. Hospitality providers may find it hard to keep up with the rapidly changing technology. Due to technology always upgrading to improve every aspect of its use providers has to keep up to improve their business. Technology delivers a different form of the saving and improvements now than before. Technology trend one is the cloud/ software as a service (SaaS). Software delivered as a service, rather than held on premises is already a mainstream technology topic and despite being a new concept in the hospitality sector, it is already big news. Also at in for they would estimate around 85% of the queries we see from hospitality companies and hotels include a serious...

Words: 775 - Pages: 4

Premium Essay

Pookie

...examine all of the components that comprise today’s and tomorrow’s IT infrastructure and how best to manage it. 5.1 IT Infrastructure When you mention the phrase “information technology infrastructure,” most people immediately think of just hardware and software. However, there is more to it than just those two. In fact, the most important and often most-ignored component is that of services. Integrating all three components forces a business to think in terms of the value of the whole and not just the parts. Including all three components in any discussion of IT infrastructure truly fits the cliché that the whole is greater than the sum of its parts. Defining IT Infrastructure If you define a firm’s IT infrastructure in terms of technology you limit the discussion to the hardware and software components. By broadening the definition to that of service-based, you are then bringing into the discussion the services generated by the first two components. Also, you are including the persware element that we discussed in Chapter 1. As technology advances the types of hardware and software available, it becomes more critical for the firm to focus on the services that a firm can provide to its customers, suppliers, employees, and business partners. To round out the list of IT infrastructure components you need to add the following services to computing hardware and software: • Computing services: Provide platforms that ensure a coherent digital environment • Telecommunications...

Words: 8576 - Pages: 35

Premium Essay

Beacuse I Have to

...... 32 CHAPTER 4 – PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE ..................................................................................................... 107 CHAPTER 5 – SECURING HARDWARE, PERIPHERALS AND OTHER EQUIPMENT .................................................................................................... 122 CHAPTER 6 – COMBATING CYBER CRIME ................................................. 146 CHAPTER 7 – CONTROLLING E-COMMERCE INFORMATION SECURITY 153 CHAPTER 9 – DEALING WITH PREMISES RELATED CONSIDERATIONS . 173 CHAPTER 10 – ADDRESSING PERSONNEL ISSUES RELATING TO SECURITY ........................................................................................................ 185 CHAPTER 11 – DELIVERING TRAINING AND STAFF AWARENESS .......... 192 CHAPTER 12 – COMPLYING WITH LEGAL AND POLICY REQUIREMENTS .......................................................................................................................... 197 CHAPTER 13 – DETECTING AND RESPONDING TO IS INCIDENTS........... 206 CHAPTER 14 – PLANNING FOR BUSINESS CONTINUITY .......................... 217 CHAPTER 15 – INFORMATION TECHNOLOGY RISK MANAGEMENT ........ 222 Introduction for Statewide Information Security Manual The Statewide Information Security Manual is the foundation for information technology security in North Carolina....

Words: 65255 - Pages: 262

Premium Essay

Infrastructure Hardware

...Information Technology Infrastructure P A R T II 4 IT Infrastructure: Hardware and Software 5 Foundations of Business Intelligence: Databases and Information Management 6 Telecommunications, the Internet, and Wireless Technology 7 Securing Information Systems Part II provides the technical foundation for understanding information systems by examining hardware, software, databases, networking technologies, and tools and techniques for security and control. This part answers questions such as these: What technologies and tools do businesses today need to accomplish their work? What do I need to know about these technologies to make sure they enhance the performance of my firm? How are ISBN 1-269-41688-X these technologies likely to change in the future? 107 Essentials of Management Information Systems, Tenth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc. IT Infrastructure: Hardware and Software LEARNING OBJECTIVES C H A P T E R 4 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. 2. What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business? What are the major types of computer software used in business? What are the most important contemporary hardware and software trends? What are the principal issues in...

Words: 21212 - Pages: 85

Premium Essay

Effects of Cloud Computing in the Global Business Environment

...Effects of Cloud Computing in the Global Business Environment Table of Contents INTRODUCTION…………………………………………………………………………………………………….…..............3-4 CLOUD COMPUTING REDUCTION IN COST……………………………….………………………………….....….4-7 CLOUD COMPUTING AND THE CHANGE OR CREATION OF SERVICES ………………….………….7-10 ECONOMIC IMPACT OF CLOUD COMPUTING………………………………………..………………..……….10-12 COMPARISON OF COMPANIES BEFORE/AFTER CLOUD COMPUTING…….………………………12-15 US ENERGY AND CLIMATE POLICY………………………………………………………………………………………15 CLOUD COMPUTING PROVIDERS………………………………………………………………………………….....16-21 Salesforce.com……………………………………………………………………………………………………………....16-17 Amazon-Web Services…………………………………………………………………………………………….....17-19 Cisco Systems…………………………………………………………………………………………………...…..19-21 CLOUD AND INDUSTRY’S FUTURE………………………………………………………………………….……... 21-22 CONCLUSION…………………………………………………………………………………………………….……...……. 22-23 EXHIBITS…………………………………………………………………………………………………………………….…...…. 24 Annual Financials for Salesforce.com…………………………………………………………………..……..24-26 Annual Financials for Amazon-Web Services……………………………………………………….….27-29 Annual Financial for Cisco Systems………………………………………………………………………30-32 Financial Ratios……………………………………………………………………………………………………………….……….33 Grow Customer Base……………………………………………………………………………………………………………….33 Grow Market Share………………………………………………………………………………………………………….……..33 Salesforce Historical Stock Chart……………………………………………………………………………..………………34 ...

Words: 6829 - Pages: 28

Free Essay

Computer Science

...Positive and Negative Impact of Computer in Society The Social Impact of Computer in Our Society From the time of the invention of the computers to the present day, computers have met tremendous changes. Time to time incorporation of the latest technical achievement has made the use of computer easier. More and more application have been developed and almost all the areas of the professions have been computerized. Computerization is continuously becoming an important part of many organizations. Computer have proved almost all the fields whether related to numeric processing or non numeric processing or document processing in the developed countries and all the walks of life. Computers have become the part of every organization.  Beneficial or Positive Impact of Computer in our Society * Any professional individual like doctors, engineers, businessmen etc. undergo a change in their style or working pattern after they get the knowledge of computer. * An individual becomes more competent to take a decisions due to the computer because all the information required to take the decision is provided by the computer on time. As a result, any individuals or institutions get success very fast.  * The person working at the managerial level becomes less dependent on low level staff like clerks and accountants. Their accessibility to the information increases tremendously. This improves their working patters and efficiency, which benefit the organization and ultimately affects the...

Words: 2409 - Pages: 10

Premium Essay

Imarket

...The iMARKET Darragh Barker Executive Summary Throughout this research paper I hope to identify the sale of digital goods as a business model and the different types of companies that operate under this business model. Investigate the revenue streams for various digital products and the commercial strategy for investment/reinvestment of profit. I will also be looking at how this digital good have affected us on a social level ie education, employment, day to day living. The beginning SoundJam MP, developed by Bill Kincaid and released by Casady & Greene in 1999, was renamed iTunes when Apple purchased it in 2000. Jeff Robbin, Kincaid, and Dave Heller moved to Apple as part of the acquisition, where they continue to work today as the software's original developers. They simplified SoundJam's user interface, added the ability to burn CDs, and removed its recording feature and skin support. On January 9, 2001, iTunes 1.0 was released at Macworld San Francisco. Originally a Mac OS 9-only application, iTunes began to support Mac OS X when version 2.0 was released nine months later, which also added support for the original iPod. version 3 dropped Mac OS 9 support but added smart playlists and a ratings system. In April 2003, version 4.0 introduced the iTunes Store; in October, version 4.1 added support for Microsoft Windows 2000and Windows XP. This is can be interpreted as the birth of the one of the most successful digital goods based companies ever. Apple...

Words: 4265 - Pages: 18