From Pencils to Pixels: The Stages of Literacy Technologies. Dennis Baron. This article contained some interesting facts about the origins of. In “From Pencils to Pixels: The Stages of Literacy Technologies,” Dennis Baron attempts to explain the histories of writing technologies. Baron, Dennis. (). From pencils to pixels: The stages of literacy technologies . In Gail E. Hawisher & Cynthia L. Selfe (Eds.), Passions.
|Published (Last):||12 April 2005|
|PDF File Size:||10.90 Mb|
|ePub File Size:||6.37 Mb|
|Price:||Free* [*Free Regsitration Required]|
All of this affected John Thoreau and Co. So the writers and users of documents had to develop their own means of authentication. In the brave new world virtual text, if you dennks an infinite number of monkeys to an infinite number of computers, you will eventually get, not Hamlet, but Hamlet BASIC.
Notify me of new comments via email. But even today, most written text does not transcribe spoken language: As we see from illustration 8, digitized graphics are easy to alter. According to Petroski, Thoreau began drnnis research in the Harvard Library.
Only die-hards and visionaries considered computer word processing worth pursuing, and even they held on to their Selectrics and their Bics just in case.
Works Cited Baron, Dennis.
You are commenting using your WordPress. In present time, teachers advise everyone to use spell check penvils their assignments before they are turned in. Even unsolicited religious messages are now circulating freely on Netnews groups.
Now teachers are making sure students revise their work until it is perfected. Start with the Purdue OWL site.
Fill in your details below or click an icon to log in: Surely they walked around all day with a bunch of sharp styluses sticking out of their pocket protectors, and talked of nothing but new ways of making marks on stones. At last, in the early s, programs like WordStar began to produce text that looked more like the typing that many writers had become used to. The final result can be so seamless that the forgery is undetectable. One of the greatest concerns about computer communications today involves their authentication, and their potential for fraud.
Figure 2 Script and Transcript.
From Memory to Written Record: As for pecnils no-crossing-out rule, writing teachers now routinely warn students that writers never get it right dennsi first time, and we expect them to revise their work endlessly until it is polished to perfection.
In order to gain acceptance, a new literacy technology must also develop a means of authenticating itself. It is not until the technology spreads that it really comes into its own. Knopf,p. As writing technology developed over the centuries, additional ways of authenticating text came into use.
Initially, people were unsure of the appropriate ways to begin or end phone conversations, and lively debates ensued. This process allowed the French to produce their own pencils, and it also permitted manufacturers to control the hardness of the lead, which in turn controlled the darkness of the mark made by the pencil.
Computerspeak enters ordinary English at a rapid pace. Overall, I found this article to be very interesting!!
Pencil technologies involve advanced design techniques, the preparation and purification of graphite, the mixing of graphite with various clays, the baking and curing of the lead mixture, its extrusion into leads, and the preparation and finishing of the wood casings.
Baron then summarizes the stages literacy technology goes through: He even omitted the pencil in his list of items to take into the Maine woods, though like naturalists before him, he certainly carried one on his twelve-day excursion in order to record his thoughts. Fill in your details below or click an icon to log in: And of course digital text can be corrupted on purpose in ways that will not be apparent to unsuspecting readers.
Of course that, too, was not an innovation in text production. He argues that even though new literacy technologies offer new opportunities for learning, naron also present opportunity for fraud.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.