The interviewee, an instructional technologist, works in a training facility that provides instructions to teachers on how to incorporate technology into their class plans. From the interview it was established that the major forms of technology being put into use are computer systems and networking facilities.
The interviewee trains teachers on how to use computer software to draft lesson plans as well as ensure proper delivery of lecture material. Some other forms of technology that are implemented include projection systems, interactive whiteboards, interactive tablets, wireless responders, laptops, digital cameras, iPods, flip cameras, televisions and document cameras.
These teachers go through sessions of training to show them how they can use the likes of power-point presentations while delivering lectures. They are taken through all the basic operations that are associated to a particular technology so that they can put it into use as effectively as possible.
With most forms of technology, reliability and stability is heavily dependent on the expertise of the handler and the frequency of use (Jonassen, 2005). The more acquainted to a particular technology a person is, the easier it is for him to use it reliably. The security of the technologies mentioned above depends on a number of factors.
Computers systems especially those with connection to external networks are prone to attacks by viruses and Trojans, as well as invasion by hackers who may end up maliciously locking up the systems. Fortunately, various antivirus and firewall software have been developed and these can be used to maintain the integrity of the systems. Other machines such as projectors and televisions are prone to break-downs occasioned by power surges (Maier, 1998).
The interviewee offers most of his training on location and most of the time she is the sole member of staff. Being a trained professional, she can easily operate the various systems that are installed in the schools she visits to offer the training.
Once she has departed from the institutions after providing the necessary training to the teachers, the users of the technology at a particular time then become the only required staffs. In some instances, the teachers may decide to employ the services of an assistant especially in setting up things like projectors and monitor screens. In this case the assistant and the teacher become the two staff members.
From the interview, the technological integration training is ideal for individuals with experience in classroom teaching and who comprehensively understand the curriculum. This is understandable because for most of the time the tutors will be the only staffs attending to the specific technologies. In schools with computers connected to an outside network, the services of a network administrator may be required.
I have been able to learn that there are professionals out there who specialize in training individuals (specifically teachers) on how to properly use technology in a classroom setting to further enhance their delivery.
It was interesting to note that entrenching the use of technology into classroom activities can serve to lighten the work of passing the message across. I have also been able to learn that the teachers while putting into use network related activities can work in tandem with network administrators to ensure that the sites they intend to have their students conduct research from contain material that is appropriate.
Reference List
Jonassen, D. (2005). Modeling with Technology: Mindtools for Conceptual Change. New Jersey: Prentice Hall.
Maier, P. (1998). Using technology in teaching & learning. Britain: Routledge.