Applications, Disaster Plan, Trends and Resources
Technology Security, privacy schools, Computing Trends, Technology Teachers k12 schools, #edchat Educational Technology, Technology Law
Welcome to the Technology Channel
of the Educational CyberPlayground.
<sigh>Technology: The only thing that could "fix" Windows would be for it to not be Windows anymore. Security never has been important in Windows.
Frankly, it's a miracle that it works at all. </sigh>
There is so much more besides what you see on the navigation bar to your left. I've tried to break it out so that your eye can see it quickly because statistically most folks won't / can't / don't even read this far! Plan on visiting over and over again, cause this will take time, but it will be time well spent.
1933 Dinner at Eight: Gene Harlow
"Technical proficiency is a dead-end. There will always be someone better. Instead focus on diversifying your skill set."
"Treat it like science, that the computer can do anything you want."
Some users will click on literally anything - even if it's obviously phishy. That's why "security awareness training" might be helpful but won't save you. ~ Thesis¹ in 1999
INDIAN WIRELESS TELEGRAPHY
Ages before the day when Marconi succeeded in establishing his wireless telegraphy, the Indians of North America carried on a system of signalling by smoke rings and fire arrows.
The settler's wife, looking out from her lonely cabin on the prairie, at the band of roving Indians, learned to note and understand the Indian smoke signals, puffing lightly into the clear blue of the prairie sky. These smoke signals are always sent in puffs or rings, so that there may be no chance of mistaking them for a camp fire. The puffs are made by covering a fire with a blanket for a minute. Then the blanket is lifted quickly, and the smoke ascends in a ring or puff. The blanketing process is repeated until a column of rings warns the Indians far and near to 'Look out,' or 'Be on the watch.' Two smokes built close together mean, 'Camp here.' Three smokes signal 'Danger.'
Signalling at night was carried on by means of fire arrows. Their meaning was like that of the smokes. The fiery trail left by the arrow in its flight through the darkness was the same signal as one smoke. The others tallied, and a flight of several fiery arrows said, 'The enemy are too many for us.' Ross Frame
How can the United States shape the global cyber landscape to promote U.S. economic interests, and develop a cyber domain that considers transparency, accessibility, security, and privacy?
We need to ask hard questions about technology. Not just "Is it cool?" but "Does it make our lives better, or more just? And does it make our world more secure?" ~ Gary Chapman
Angry lawmakers hammered the Education Department’s chief information officer, Danny A. Harris, cio SINCE 2008 at a hearing Tuesday, accusing him of ethical lapses and failing to secure the agency’s “vulnerable” information systems. “Cybersecurity for the federal government is a matter of quality management and effective leadership, not just tech,” said Rep. Will Hurd, a Texas Republican who is chairman of the U.S. House of Representatives information technology subcommittee. Lawmakers warned that the Education Department, which holds some 139 million unique Social Security numbers, is a “prime target” of hackers. HE had hired subordinates to work on side businesses, failed to report more than $10,000 in income from those ventures, participated in a panel that awarded a contract to a friend, and helped a relative land a job at the agency. He has since taken part in "ethics counseling" provided by the department.
U.S. Education Dept. ripe for breach more devastating than OPM’s
The Department of Education is primed for a large data breach that could eclipse the one experienced by the Office of Personnel and Management (OPM), House Oversight Committee Chairman Jason Chaffetz (R-Utah) said last week at a Brookings Institute function. With its rich set of data, including 139 million Social Security numbers and information on 40 million students who’ve taken out federal loans, and an “F” rating by the Inspector General based on the criteria established under the Federal Technology Acquisition Reform Act (FITARA), a breach at the agency could be more devastating than OPM’s.
2016 Stephen Hawking says artificial intelligence could be humanity's greatest disaster
“The rise of powerful AI will be either the best or the worst thing ever to happen to humanity. We do not know which,” the British physicist said.
Sanitization: 15:09 What destruction actually means of when Destroying Hardware. Ram, Hybrid hard drives, solid state drives and flash memory devices are difficult or impossible to sanitize effectively. In most cases safe disposal will require destruction. Can still retrieve classifed secret info from anything greater than 12 millimeter bits of dust, only less than 3 millimeters is considered properly destroyed. 17:09
What do you know about PRISM, the NSA, and your rights online.
Stop telling On Yourself
You've Lost Privacy, Now They're Taking Anonymity
Why Surveillance is the Dominant Business Model on the Internet?
Because the surveillance economy has replaced the free economy. Bruce Schneier says "Surveillance is the dominant business model on the Internet." Google and Facebook are packaging us up. Use DuckDuckGO.
The Homeland Security and Governmental Affairs Minority Committee offered an overview of the fed's current state of cybersecurity. And how is the government with which we entrust our most sensitive and private information looking? In short—bad. Very, very bad. So just how bad is it? We've picked out some of the more troubling revelations here, but you can read the report in its entirety down below. Brace yourself—it ain't pretty. Fed Cyber Report - Feb 4 2014
The first congressman to battle the NSA is dead. No-one noticed, no-one cares. BY MARK AMES ON FEBRUARY 4, 2014
Last month, former Congressman Otis Pike died, and no one seemed to notice or care. That’s scary, because Pike led the House’s most intensive and threatening hearings into US intelligence community abuses, far more radical and revealing than the better-known Church Committee’s Senate hearings that took place at the same time. That Pike could die today in total obscurity, during the peak of the Snowden NSA scandal, is, as they say, a “teachable moment” —one probably not lost on today’s already spineless political class.
2014 Intel CEO Refuses To Answer Questions On Whether NSA Can Access Processors
Just a reminder that Sun (née Oracle) released the source code to their T1 and T2 processors under the GPL open-source license:
Furthermore SPARC architecture machines are available from non-American third-parties (e.g. Fujitsu) and can run mainstream (server) operating systems (Solaris, Linux, BSD).
If one is so inclined, one can license and manufacturer/sell the CPUs
The BIOS-equivalent for SPARC is also available commercially and open
source, and was/is defined in IEEE 1275:
You also have to find designs for PCIe controllers, Ethernet (wired and
wireless) chipsets, graphics cards, etc.
The Joy of SMS TXT MSG
What could one possibly do with 160 characters? In 2012 SMS is 20 years old in internet time it's 140 years old, and a far more important invention than the flashier inventions that have followed it. In 1996, something changed: pay-as-you-go sim cards were introduced. Suddenly teenagers could acquire mobile phones. And when they got them, boy did they know what SMS was for. It was a tipping point. The graph turned skywards, and it's been going in that direction ever since. SMS is now the world's most intensively used data communication technology. We need to stop being dazzled by the tech sensation du jour (Facebook, Twitter, Angry Birds, OMGPOP etc) and focus instead on something mundane that really works, reaches everyone, providesvaluable services for poor people, exploits nobody and is based on a sustainable business model.
Google's Eric Schmidt spoke about the future of wireless, information, and connectivity:
"Filtering technology will inevitably become more effective, and we face the very real possibility that we could end up living in a society in which software silently deletes our voices, our thoughts and our culture," Schmidt said.
- Looking back at 2011, we now see that if you connect people with information, they will change the world.
- Connectivity, even in modest amounts, changes lives.
- With information comes power, and with power comes choice.
- Government’s that try to censor will fail. Like water, information will always find a way through.
- The Internet wasn’t built with criminals in mind, and we are a decade away from truly addressing this.
- The biggest threat we face is States pursuing cyber-criminality.
- There is no delete button online. A false accusation in a person's youth would fade away, but now the accusation can remain online forever thus we envision the emergence of a system that ranks truth over falsehood.
- The future can be delayed, but it cannot be denied.
- Information is a birthright for everyone, everywhere.
- Connecting the world will free the world.
BUT: here is where Eric Schmidt is wrong: he violates our social norms, namely that we won't stand for being videoed, watched, recorded by friends, family, or colleagues, whoever and whenever. Engineers who clearly don't understand interpersonal interactions. are culturally clueless, will remain sidelined in social situations as they currently are now. Surveillance is OK for buildings, but it's most certainly not OK for personal and business relationships.
Fun Fun Fun
The Concept of the Computer Emerges
THE INTERSECTION OF ART - DESIGN - WEAVING - SILK - CLOTHES AND COMPUTERS
In 1804, French silk weaver Joseph Marie Jacquard (1752 – 1834) invented the Jacquard Loom that weaved complex designs. Jacquard invented a way of automatically controlling the warp and weft threads on a silk loom by recording patterns of holes in a string of cards. The Jacquard cards were later modified and evolved into computing punch cards by the great English computer pioneer Charles Babbage (1791 – 1871) – who had designed a never-completed cogwheel computer.
Paul Otlet (1869 - 1944) Starts Using Technology in 1934 to Help Us Organize Information and the Classification of knowledge. In the late 1800s and early 1900s Otlet pioneered the field of what we today call information science, but what he called documentation. A hundred years before the development of the Internet, Otlet used terms like web of knowledge, link, and knowledge network to describe his vision for a central repository of all human knowledge. Also see
"Technology is dominated by two types of people: those who understand what they do not manage, and those who manage what they do not understand."
One BIG tip - don't assume kids know how to use the technology. Make sure you show them hands on in the computer lab/1-to-1/ or however to do things right the first time. You will be amazed at what kids don't know how to do. There are also kids who HATE technology who will need extra hand-holding. Let them teach each other, too.
David Laws writes at the Examiner:
January 11, 2011 marks the 40th anniversary of the first appearance of the name Silicon Valley in print. Under the headline SILICON VALLEY USA, journalist Don C. Hoefler wrote the first of a three-part series on the history of the semiconductor industry in the Bay Area. His behind the "scenes report of the men, money, and litigation which spawned" the industry appeared on page one of the industry tabloid Electronic News on Monday January 11, 1971.
He points out that there is anecdotal evidence of the use of the name "Silicon Valley" prior to this date but that, "Author Michael S. Malone suggests that Hoefler's pioneering coverage of the Silicon Valley community as a collection of characters, dreamers, and eccentrics made him "the one that put the whole idea in our minds".
In 1970 things were different, to live a full life you had to be willing to take chances, you had to go for the ride. You had to leave the house. Are you, or is your family walking around plugged in looking at a screen? Have you or your loved ones stopped going on real adventures?
ADVICE FROM THE CYBERPLAYGROUND:
Schedule some time every day for disconnection: maybe a block in the morning where you get your best work done, and a block in the afternoon when you get out and active, or connect with friends or family.
IAD = Internet addiction Disorder
changes brain similar to cocaine
A Brain Scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. 1/12/12
For the study, published in the Jan. 11 issue of PLoS One, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. The researchers found more patterns of "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. [SEE ADD]
The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowden Jones, consultant psychiatrist at Imperial College in London, who runs the U.K.'s only clinic for Internet addicts, said hardcore gamers are more likely to be addicted to the Internet. "The majority of people we see with serious Internet addiction are gamers - people who spend long hours in roles in various games that cause them to disregard their obligations," Jones told The Independent. "I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game." An estimated 5 to 10 percent of Internet users are unable to control their usage and are considered addicts.
2013 free programming tool MIT App Inventor
2010 Educational Technology survey of in Higher education instructor and student perspectives on and its impact on student engagement and learning outcomes across the United States.
Technology vs. Good Work and Study Habits: After reading this survey this will explain why your kids don't need a cell phone, computer, TV etc etc etc, Temptation and Productivity: A Field Experiment with Children
Alessandro Bucciol, Daniel Houser & Marco Piovesan
Journal of Economic Behavior & Organization, forthcoming
Abstract: Substantial evidence from psychology suggests that resisting temptation (exercising self-control) in one domain subsequently reduces one's capacity to regulate behavior in other domains. A reason is that people have limited self-regulatory resources, and self-regulatory failure occurs when these resources become overwhelmed. This paper provides evidence that this same mechanism can lead to reduced economic productivity subsequent to exposure to temptation. Using a design inspired by the classic "Marshmallow Test", we report data from a field experiment in which children between the ages of 6 and 13 were exposed (or not) to a consumption temptation. We use these ages to take advantage of the well-established fact that the self-regulatory resources of younger children are more easily depleted than those of older children. We find that, subsequent to exposure to temptation, productivity of younger children is significantly detrimentally impacted, while that of older children remains essentially unchanged. To our knowledge, this is the first rigorous demonstration that one need not succumb to temptation in order for it to detrimentally impact one's economic productivity.
The Internet and American Life Project at the Pew Research Center found that from 2006 to 2009, blogging among children ages 12 to 17 fell by half; now 14 percent of children those ages who use the Internet have blogs. Among 18-to-33-year-olds, the project said in a report last year, blogging dropped two percentage points in 2010 from two years earlier.
Video Gaming Can Lead To Mental Health Problems Jan 18, 2011
Pathological gaming, or video game addiction, has been associated with problems in youth including depression and poor grades. There may be identifiable risk factors for becoming a problem gamer and suffering negative outcomes, according to a new study, "Pathological Video Game Use Among Youths: A Two-Year Longitudinal Study"
Video Game Addiction Tied To Depression, Social Problems And Poorer Grades In School Video game addiction is a global phenomenon and appears to lead to poorer grades in school and serious psychological problems, including depression, anxiety, and social phobia, said an international team of researchers who followed over 3,000 third through eighth grade students in Singapore and found the percentage of pathological youth gamers there to be similar to other countries.
"There is an evil tendency underlying all our technology
- the tendency to do what is reasonable even when it isn't any good."
~ Robert Pirsig, Zen and the Art of Motorcycle Maintenance
The classroom enviornment and using technology, internet and for critical thought, how to learn, and create comething new.
2008 The International Society for Technology in Education (ISTE) has issued new technology standards for teachers. For every performance indicator within each category, ISTE has included a rubric that describes what meeting the standard would look like at four levels of proficiency: beginning, developing, proficient, and transformative.The "transformative" proficiency level is new to the revised standards, and it's indicative of ISTE's more recently articulated focus on really transforming education through the use of technology, not just layering technology over traditional educational practices. The "NETS for Teachers, Second Edition" includes five categories, each with its own set of performance indicators:
- Facilitate and inspire student learning and creativity,
- Design and develop digital-age learning experiences and assessments,
- Model digital-age work and learning,
- Promote and model digital citizenship and responsibility, and Engage in professional growth and leadership.
Under the category "facilitate and inspire student learning and creativity," for example, there are four performance indicators:
- Promote, support, and model creative and innovative thinking
- Engage students in exploring real-world issues and solving authentic problems using digital tools and resources
- promote student reflection using collaborative tools, and model collaborative knowledge construction by engaging in learning with students.
Educators, Administrators, Parents and Policy Wonks alike will find sections dedicated to the How To Integrate Technology and Ethics for the Administrators as well as resources and special topics about Podcasts, Privacy, Standards, HomeSchoolers, Plagiarism, K -12 Classroom Law, DRM, Copyright, and CopyLeft issues, Power and Bandwidth. and the Disaster Plan for the WHO Human to Human Pandemic H1N1.
"Why don't they pass a constitutional amendment prohibiting anybody from learning anything?
If it works as well as prohibition did, in five years Americans would be the smartest race of people on Earth."
Digital Students @ Analog Schools
"Professors don't really get that" these skills aren't really being offered in the classroom. Marco Torres ex-students produced a video about their first year in college. Basically about their disappointment in the use of technology in their classrooms, that they were expecting more.
At risk, professors say, is nothing less than U.S. technology supremacy. As interest in computer science drops in the U.S., India and China are emerging as engineering hubs with cheap labor and a skilled work force. Schools across the country are taking steps to broaden the appeal of the major. More than a dozen universities have adopted "media computation" programs, a sort of alternate introduction to computer science with a New Media vibe. The classes, which have been launched at schools from the University of San Francisco to Virginia Tech, teach basic engineering using digital art, digital music and the Web. The computing industry has a reason to be concerned about the future. The number of new computer science majors has steadily declined since 2000, falling from close to 16,000 students to only 7,798 in fall 2006, according to the Computing Research Association. And the downward trend isn't expected to reverse soon. The association says about 1 percent of incoming freshmen have indicated computer science as a probable major, a 70 percent drop from the rate in 2000.
Education is a business and your school district technology decisions are made by the CIO the Chief Information Officer.
"If we don't change directions,
Computers are incredibly fast, accurate, and stupid; humans are incredibly slow, inaccurate and brilliant; together they are powerful beyond imagination.
The most damaging phrase in any language is "it's always been done that way."
Charlie Lyons, superintendent and director at Shawsheen Valley Technical High School, in Billerica, said he spends $50,000 a year on computer updates and security. He also hired a director of computer services because the school has nearly 700 computers. More teachers who used to keep grades on paper and tests in files are relying on computers.
|"Children today are tyrants. They contradict their parents, gobble their food, and tyrannize their teachers."
-- Socrates (420 BC)
Students, Teachers Differ on Technology Use.
Do kids use computers and get anything out of it? Monterey Institute for Technology and Education studies "informal learning" what children learn outside of school, with digital media and the Internet. With digital media (music, video, photos and text on connected devices), kids are galloping ahead in their informal learning, even as their formal education isn't much different from their parents', and their schools are scrambling to figure out what to do about their tech proficiency. Young Web devotees are engaging their minds far more than previous generations that were glued to the television," e.g., posing questions in chat or IM, researching answers, designing pages and profiles, and developing skills they'll need in future careers. Teen life has become a theatrical, self-directed media production. 68% of teens have profiles on social networking sites, about 75% spend 2 - 3 hours a day listening to or downloading online music. The student has become the spy master “the emergence of citizen's media” in education.
From 1983 - Present
It is still a disaster in the K-12 classroom according to the children. Kids know how to use technology but teachers don't.
Teachers who participated in the Bell South Foundation's Power to Teach project www.bellsouthfoundation.org/pdfs/pttreport03.pdf
reported that they had made significant strides in integrating technology into the learning experience. However students reported seeing few changes in classroom instruction, they see it as nothing has changed, technology is still only an add on and not really a seemless part of the ONLINE CURRICULA. Technology will never replace teachers -- but, those who use technology will replace those who do not.
EDUCATING THE NET GENERATION
"A number of authors have argued that students who are entering the higher education system have grown up in a digital culture that has fundamentally influenced their preferences and skills in a number of key areas related to education. It has also been proposed that today's university staff are ill equipped to educate this new generation of learners -- the Net Generation - whose sophisticated use of emerging technologies is incompatible with current teaching practice."
EDUCATING THE NET GENERATION: A HANDBOOK OF FINDINGS FOR PRACTICE AND POLICY
reports on a collaborative project that began in 2006, between staff at the University of Melbourne, the University of Wollongong, and Charles Sturt University. Some of the findings of thestudy included:
"The rhetoric that university students are Digital Natives and university staff are Digital Immigrants is not supported."
"[E]ven though young people's access to and use of computers and some information and communications technologies is high, they don't necessarily want or expect to use these technologies to support some activities, including learning."
"The use of publishing and information sharing tools, such as wikis, blogs and photo sharing sites, positively impacted on many students' engagement with the subject material, their peers and the general learning community."
"[M]any Web 2.0 technologies enable students to publicly publish and share content in forums hosted outside their university's infrastructure. This raises complex questions about academic integrity including issues of authorship, ownership, attribution and acknowledgement."
STUDENT COMPUTER SKILLS: PERCEPTION AND REALITY
By administering survey and assessment instruments to over 200 business school students, researchers Donna M. Grant, Alisha D. Malloy, and Marianne C. Murphy compared students' perceived proficiencies in three computer skills areas -- word processing, presentation graphics, and spreadsheets -- with their demonstrated skills. Their research results showed "some differences in the students' perception of their word processing skills and actual performance, no difference in perception and performance for their presentation skills, and a significant difference in perception and performance for their spreadsheet skills.
"A Comparison of Student Perceptions of their Computer Skills to their Actual Abilities" (JITE, vol. 8, 2009, pp. 141-60),
2007 State Technology Grades & Download your state report!!
Overall Grades at a GlanceThe Editorial Projects in Education Research Center now finds that, unlike 10 years ago, most states have technology standards for students and educators, for example. But few states test to see if those standards are being met, so the degree to which schools are reaching them is unknown. Anecdotal evidence and research suggest that teachers' integration of digital tools into instruction is sporadic. 2007 The majority of teachers are not tech savvy. Many young people's reliance on digital technology in their outside lives stands in sharp contrast to their limited use of it in school.
Seymour Papert 1983
2016 RIP Seymour Papert, theorist behind One Laptop Per Child, dies at 88 South African computer scientist had an outsized influence on tech-driven learning.
DR. PAPERT who you can WATCH VIDEO 1983 see Logo as a Symbol of Constructionist Learning and Cynthia Solomon who worked closely in the development of Logo with Seymour Papert and Wally Feurzeig at Bolt, Beranek and Newman and then in1969 joined Seymour at the MIT Artificial Intelligence Lab where we started the Logo Group.
Q1. How can arguably the most famous effect in electrical engineering have remained unanalyzed for 180 years?
Q2. How can a big error in the most famous physics textbook ever published have gone unreported since 1964?
Q3. Somebody must design microwave oven doors based on laboratory measurements. Where are these people?
Dan Gillmor May 10, 2012
Columbia Journalism Review on press freedom around the world:
In December 2010, the major payment systems used to buy goods and services online decided that Wikileaks was no longer an acceptable customer. Mastercard, Visa, and PayPal summarily cut off service, putting Wikileaks into deep financial trouble and further marginalizing an organization that had become an object of fear and loathing inside the US government and other centers of wealth and power.
While many in the new media world sounded an alarm, the response of journalists from legacy news organizations was mostly silence, except to take note of what had happened. By ignoring the implications of what had happened—a financial blockade of an organization engaged in recognizably journalistic pursuits—traditional media people demonstrated how little they understood or appreciated the information ecosystem in which they also exist. And by failing to object, loudly, they gave tacit assent to tactics that should chill people who genuinely believe in free speech.
It was not the first time traditional journalists failed to grasp a fundamental reality: Governments and businesses are creating choke points inside that emerging ecosystem—points of control where interests unfriendly to journalism can create not just speed bumps on the fabled information highway, but outright barricades.
This is not just an issue for journalists in places like China or Saudi Arabia or Russia, where governments are creating more and more stringent restrictions on what people can say and do online. It is an American matter as well. In the developed world, Hollywood and other corporate interests have taken the lead in threatening the Internet’s freewheeling nature—and they’ve had plenty of help from government. ...
LEARN HOW TO PROTECT YOUR PRIVACY AND YOUR COMPUTER FROM EVERYTHING NASTY.
The Data Loss Database - Open Source has almost 510 events and over 143 MILLION compromised records as of 12/06. Now that everyone will have one of those $100.oo computers it is going to change you need to be aware of computer security problems. There will be so many new worms, viri, trogen horses, botnets and other skank to defend against it may break the internet.
A tool is what you make of it.
You might be able to paint a masterpiece using a a brick dipped in paint or a hammer to put a screw into a board. It all depends on what a human does with this tool - not the tool itself.
Do you have experience? Learn what an Educators Professional Responsibility is to the public, to make sure their website does not end up as a nasty /xxx/ site. Do you know how Bury Your Dead Ed Dot With Dignity?
PLUG INTO INTERNET HISTORY
NetHappenings Mailing List, is the first and oldest education list in the US started in 1989.
Please consider joining this community or one of the other education mailing lists we also moderate to keep up with the latest happenings.
SCHOOL DIRECTORY ©1993
The first and oldest database created for school websites when they first came online. This area is organized by state or grade level. Citizens are invited to list your school's website into the Master Directory where you can see what the other schools have done with their sites.Clinton Takes Questions in a Digital Fireside Chat (NYT) November 9, 1999
Already the master of the rope line and televised town meeting, President Clinton took a technological leap into the computer age Monday night by becoming the first president to participate in a live Internet chat. The president, who describes himself as old-fashioned and technologically challenged when it comes to computers, never touched a keyboard or a mouse. He merely sat in front of a Toshiba laptop on a stage at George Washington University and responded verbally to questions sent to him. His remarks scrolled word for word across tens of thousands of computer screens. The president appeared in a tiny video box, and could be seen -- albeit sometimes just barely -- putting his hand to his chin, sipping from a soda can and looking amused at the entire extravaganza.
2008 President Obama used the internet to campaign for president. Now you can tweet the President of the United States.