Khan Academy to launch computer science curriculum
- 14 August, 2012 17:10
On Wednesday, free online tutorial service Khan Academy will launch a new series of instructional videos covering the field of computer science.
Shantanu Sinha, Khan Academy president and COO, called the curriculum "pure magic," in another Twitter message.
Backed by ads as well as donations by Google and the Bill and Melinda Gates Foundation, the not-for-profit Khan Academy offers over 3,300 short instructional videos on basic math, biology, chemistry, physics and other subjects. The videos have been praised for how they explain complicated ideas in small, easily understandable chunks. The organization's roots are in videos that Salman Khan created and posted on YouTube starting in 2006 as part of his efforts to tutor some young cousins in math.
Since its incorporation as a nonprofit in 2008, Khan has grown to be one of the most popular self-paced online schools. The organization's YouTube channel has attracted 370,000 subscribers and over 174 million video views. The videos are organized so that users can systematically learn an entire subject, such as trigonometry or calculus. The organization also provides statistics, badges and suggested paths of learning to further motivate users.
While Khan has created a lot of good will among its users, observers of higher education caution at the limits of the organization's video-based approach.
"Khan Academy is great for learning about lots of different subjects. But it's not really adequate for learning those subjects on a level that really makes a difference in the world," wrote Robert Talbert, a mathematics professor at Grand Valley State University,in a widely discussed blog post on the Chronicle of Higher Education Web site.
Neither Resig nor Khan Academy immediately responded to requests for comment.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- IBM WebSphere MQ: The Right Information in the Right Place and Time
- Redbook - Scalable, Integrated Solutions for Elastic Caching Using IBM WebSphere eXtreme Scale
- Business Continuity Planning IT Survival Guide
- Unified Recovery Management - Reducing Risk and Cost by Simplifying the Recovery Infrastructure
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.
Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. This whitepaper examines the escalating complexity for the security management environment; how to get more meaning from data already collected and the combination of infrastructure, analytic tools and threat intelligence need to drive business value from Big Data. Download now.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.