tasks1

Open Source Licenses

168: Open Source Software Licenses | RSS.com Open-source software is also free to use, but “free” can be applied to its use in two ways. First, it can be used at no cost for the user. We download open-source software, just as well do any software, but installation proceeds without entering account information. Second, users are free to use the software in that they Read More

tasks1

WCAG for Educators

In the modern classroom, the “workspace” isn’t just a physical desk; it’s a Learning Management System (LMS), a digital worksheet, and a shared slide deck. As education shifts deeper into the digital realm, ensuring every student can access these tools is no longer a “bonus”—it is a professional and legal necessity. The latest update, WCAG Read More

tasks1

A Brief History of Computers in Schools

A Brief History of Computers in Schools   In the United States, desktop computers arrived in classrooms beginning in the late 1970’s and early 1980’s, which is when they arrived on the consumer market as well. If you walked into one of the classrooms where there were those first desktop computers installed, you probably would have seen one or two computers; nearby, there would have been a box of Read More

tasks1

On Becoming Educated

I’ve been rereading Steven Pinker’s Enlightenment Now. I am familiar with criticism of his work, but I am a fan nonetheless—maybe it comes from the fact that I believe we can read works even if we dispute some of the points and still find them worthy. In his chapter on “Knowledge” Pinker writes: “So much Read More

tasks1

Teachers and AI, But Not with Students

Artificial intelligence is rapidly becoming a quiet partner in the work teachers do every day. While much of the conversation focuses on collaborative, whole‑school adoption, the reality is that many educators are using AI individually—experimenting on their own, testing tools privately, and integrating them into their workflow long before formal policies or training appear. In Read More

tasks1

ARP Spoofing

A post for students in network security class: ARP spoofing is a powerful technique used by hackers to intercept and view unencrypted web traffic on a local area network (LAN). This attack exploits a fundamental vulnerability in the Address Resolution Protocol (ARP), which the internet uses to map a device’s IP address (where it is Read More

tasks1

Deep Fakes

A blog post for students network security class: Deepfakes represent a modern frontier of digital deception, consisting of counterfeit images, videos, or sounds generated through machine learning algorithms. While these tools can be used for entertainment, they are increasingly weaponized by hackers as social engineering techniques to psychologically influence human behavior. By using technology to Read More