Skip to main content

Innate and Non-innate learning

I am reading a book called 'What did you ask at school today?' by Kamala V Mukunda. Would like to share some learning. The book is intended for teachers as primary audience, nevertheless, good for any adult to gain deeper understanding on learning process.

She talks about brain structure, innate and non-innate learning aspects and talks about synergy needed between the two in the first two chapters.

Firstly, innate learning is something that would not need explicit training. For example, kids learning the language. They wont feel strained or stressed during this kind of learning, just because they enjoy the process, where as non-innate learning focuses more on class room learning. It is accepted that learning through playful means will have more impact on kids than the impact through the structured learning. A physcologist, David Geary puts it this way - while learning through playful means has more impact, children should be encouraged to learn the skills through structured learning even when there is lack of motivation. Because, not all skills can be taught in playful mood. For example, differentiation and integration in mathematics. To do this, the teacher has to demonstrate and students need to be attentive so that the process can be repeated to wire the concept of differention and integration in the brain.

In this context, the author talks about primary learning, where the students experience and learn, proved to be more effective than secondary learning, where the teacher teaches (passive) the concepts in a structured way. Both methods have their side of advantages and disadvantages. In former case, the students must know what they want to learn and in the latter case, the students must be attentive enough to follow the teacher. Experiments have been conducted to understand the process of knowledge discovery, where one set of students were provided learning infrastructure to learn on their own while the other set of students were provided the same infrastructure, but were asked to experiment along with instruction manual. At the end of the experiment, the basic concepts were examined and both the teams showed good understanding of the concepts. When the concepts were examined a year later, the latter team had emerged stronger. Thus, it was concluded that Guided knowledge discovery is more effective than Self learning knowledge discovery. Interesting ... isnt it?

Also, it is important to teach the kids to differentiate between the concepts and process from the early age. For example, how do you define 'heat' and how do you explain 'perspiration'.
In the next post, I will share my learning on 'Constructivism', 'Procedural learning'.

Its an interesting book, still going through, will post bits and pieces as I cruise ...

Comments

Popular posts from this blog

Key to adopt open source product

Friends, I am working on business solution implementation on open source product called Kaltura. Kaltura is a media management solution and has loads of features that compel any business to take a peek into it. More-over this is the only complete end-to-end open source software available to handle digital assets. But it comes with its own head ache. Considering its open source, its understandable. I feel, handling these would ensure you the success in your open source product implementation. 1. In my opinion, before adopting any open source software, build the capability to deal with the inconsistency bundled in the open source software. 2. I would avoid involving external consultants for 2 reasons.      a. I am not sure, they would bring necessary expertise on to table      b. I fear that there would be little ownership, they will not see big picture of my business (neither I am interested to share it all) 3. Alternative to that is to build the team that is capable of debuggin

Secure your application on cloud

Handling sensitive data Define sensitive data for your application. Classify as sensitive data and confidential data. Sensitive data is something like password, credit card account number, something that you should not compromise at all. Confidential data could be your customer’s health record, something that requires your permission before its usage. So, you need to define sensitive data in the context of your application. There are many ways to protect the sensitive data in transit; the easiest way is to use SSL. This is nothing different than handling sensitive data in any traditional application.   However, make sure you apply this rule while designing your application for cloud deployment. Alternatively, you can encrypt the sensitive data and transport. Be noted that any kind of protection you design, will have implications on performance. However this is ignorable considering the nature of sensitive data. If you just want to protect your data from being tampered during

Essential GCP services for a new age application

Identity and resource management IAM  Identity aware proxy Resource Manager Stackdriver Monitoring Stackdriver Monitoring: Infrastructure and application monitoring Stackdriver Logging: Centralized logging Stackdriver Error Reporting: Application error reporting Stackdriver Trace: Application performance insights (latency) Stackdriver Debugger: Live production debugging Development management Cloud Deployment Manager: Templated Infrastructure deployment Cloud Console: Web based management console Cloud shell: Browser based terminal/CLI Development tools Cloud SDK: CLI for GCP Container registry: Private container registry Container builder: Build/Package container artifacts Cloud source repository: Hosted private git repository Database services Cloud SQL: Managed MySQL and PostgreSQL Cloud BigTable: HBase compatible non-relational DB Cloud Datastore: Horizontally scalable non-relational (ACID) Cloud Spanner: Horizontally scalable relational D