Technology Integration Introduction

The use of instructional technology has evolved over the last two decades. Initially, instructional technology had two uses: learning about computers and using computers to increase basic skills. Learning about computers morphed into computer literacy, which is typically defined as the history, terminology and background of computing, using computing tools, programming, as well as ethical and social uses of computing. Using computers to increase basic skills relied upon technology that was robust for the time, incorporating a management system and drill-and-practice programs.

Each of these uses required a separate computer lab, often staffed with a certified teacher or a teacher's aide. While both purposes put computing into the schools, they may have ultimately militated against integration. By isolating computers in a single room and having only one person responsible for use of the technology, kids may have had some access, but the teachers had none. Without access to the technology, teachers were unable to learn about it for themselves, and they certainly were unable to use it with their students.

As pioneer teachers began using technology in exciting ways and more technology was being purchased, additional teachers became exposed to technology. Then along came the Internet, E-Rate, more software and some tangible positive results of students using technology. This changed the rallying cry from training students how to use computers a la computer literacy to integrating technology throughout teaching and learning. But the pressure did not just come from computer-using teachers and technology advocates, it also came from parents and students.

Technology integration moved from the rallying cry of parents, students and technology coordinators to public policy with the No Child Left Behind Act (NCLB), which requires state applications for education technology funds to contain "a description of how the State Education Agency will ensure ongoing integration of technology into school curricula and instructional strategies in all schools, so that technology will be fully integrated into curricula and instruction by Dec. 31, 2006." And states are addressing the requirement in different ways. Approaches range from a reasonably straightforward certification from districts to extensive state-level evaluations. The flexibility within NCLB allows states to determine their own method for responding to the requirement, but also makes implementation more difficult due to resource allocations and the lack of a specific mandate from the federal government. The articles in this section and online offer a few examples of the approaches states are taking to ensure technology integration by 2006.

Featured

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • laptop with a neural network image, surrounded by books, notebooks, a magnifying glass, a pencil cup, and a desk lamp

    D2L Updates Lumi with Personalized Study Supports

    Learning platform D2L has introduced new artificial intelligence features for D2L Lumi that help provide more personalized study supports for students.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.