Feeds

Bash Street bytes: Do UK schools really need the Raspberry Pi?

Does Britain really need to be a nation of coders?

High performance access to file storage

Feature There’s been a right fracas in education this year, with the government proclaiming that ICT (Information and Communication Technology) teaching is dull and demotivating, and that kids need to be be taught more programming, and less use of applications.

Into the fray like a white knight comes the Raspberry Pi, a tool designed to put the joy of coding back into kids’ hearts. Its arrival has been followed by a multitude of articles in the mainstream press which have given it a massive thumbs-up as the great teaching aid that will save us all and give us an IT-savvy workforce for the 21st century.

Well, the broader buzz surrounding the Raspberry Pi has reached some kids at least. I teach ICT-based lessons in primary schools, and pupils have approached me with shouts of “I’m getting a Raspberry Pi for Christmas!” and “I’ve been making programs on my dad’s Raspberry Pi!”

That second quote speaks volumes: there’s a passionate gang of "geek dads"’ around, who are impressing the coding bug upon their offspring while they relive their ZX Spectrum youth.

Raspberry Pi UK

Raspberry Pi: some pundits see the ultra-cheap computer as the saviour of UK IT

Dads like these – and, sorry, it does tend to be dads, not mums – are doing their best to get the Pi inside the school gates. Nick Corston, a parent from St Saviour’s C of E, Paddington, London, organised a Raspberry Pi taster session for the kids as part of a “creative thinking and doing” activities day. The school is now setting up an after-hours Code-Club as a way for those children who were inspired by the activity to take it further.

No doubt, coding clubs are a fantastic extra-curricular feature for schools, but what about utilising the Pi in lessons?

The draft proposal for the new ICT curriculum is laden with coding-oriented objectives. It suggests that all pupils should “understand the fundamental principles of computer science, including algorithms”, and should “have repeated practical experience of writing computer programs”.

The Raspberry Pi, you might think, should be the perfect tool for all this. But what do teachers actually think of the Pi? Does it lend itself to productive, worthwhile lessons - or will children be just as disenchanted using a Pi as they were being taught the "bad" old ICT exam specs?

Jenny Griffiths, the head of department at Richard Lander, a Specialist Technology College in Truro, Cornwall, expresses reserved enthusiasm for the RPi: “It could be the start of something really positive.” Currently, the college has 15 children taking the OCR GCSE in Computing a year earlier than kids normally take their GCSEs – they cherry-pick “gifted and talented” students, which seems like a sensible way to get the right children geared up and enthused about programming early on.

Jenny would love Raspberry Pi - an impressive British initiative, she thinks - to be a success. Yet the device is only used by Computing GCSE children occasionally, and it isn’t the essential item you might suppose.

She likes her Pi

She likes her Pi: Taygan Forth loves coding, though it’s “a bit annoying when you have to repeat your typing again and again.”
Source: Giles Hill

Adam Griffiths, Jenny’s husband and the College’s lead programming teacher, told me that he isn’t about to rush out and buy one for every child, even though he considered this approach at first. It isn’t hard to understand the problem, walking around Richard Lander’s impressively organised computer labs; these rooms have to cater for many different students and subjects, and the Raspberry Pi doesn’t fit well into that sort of environment.

“So we’re going to spend five to 10 minutes at the start of every lesson, and the same again at the end, fiddling around with unplugging and reconnecting the PCs already in the room?” he says. Sure, his GCSE Computing kids can handle it, but an average class of 30 13-year-olds? The chaos, time wasted – not to mention the inevitable breakages – just wouldn’t be worth it, even for a 26 quid computer.

High performance access to file storage

Next page: Pi practicalities

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.