NewEngland

On Professional Development Models for #edtech

Recognizing that teachers are flexible professionals who specialize in using technology to support teaching and learning require on-going opportunities for professional learning is essential for school and technology leaders. This professional learning will be characterized by a mix of self-selected and self-defined learning (based on one’s expertise and understanding of current need) and new ideas, Read More

NewEngland

Social Influences on Technology Decisions

Educators are social beings (just as all humans are) and so the social environment in which they live and work is meaningful and influences their intentions and their behaviors. When school and technology leaders take steps to ensure that individuals perceive other individuals (especially those who are respected and perceived to be doing similar work) Read More

NewEngland

Penetration Testing

Another post for network security students: Penetration testing is a simulated attack against an organization using the same information, tools, and techniques available to real attackers. During a penetration test, testers seek to gain access to systems and information and then report their findings to management. The results of penetration tests may be used to Read More

NewEngland

Data Wrangling

Another post for data analytics students… Data wrangling, also known as data manipulation, is the process of preparing data for use, ensuring it’s in a specific shape or format that applications can utilize. It involves skillfully handling and managing data to make it usable for analysis. Methods for data wrangling include: • Merging data—Combining datasets Read More

NewEngland

Bias in AI Decision-Making

Historically, humans have been the decision-makers in areas such as hiring, loan eligibility, and medical diagnoses. However, artificial intelligence (AI) has advanced to the point where it can perform certain tasks more skillfully and reliably than humans. AI is now utilized in hiring, loan assessments, housing, medicine, and other sectors due to its enhanced accuracy. Read More

NewEngland

Sources of Data

Another post for data analytics students. There are several methods available for collecting data, including utilizing public sources, collecting your own data, and automated data collection through data pipelines. Utilizing public sources of data: • Public databases offer various datasets for free, readily available for download. These sources may be pre-cleaned and organized. • Open Read More

NewEngland

What is SQL?

Here is a post for my students who are beginning there work in data analytics. SQL (Structured Query Language) is a programming language designed to work with a relational database management system (RDBMS). Key points to remember about SQL: SELECT FROM WHERE The SELECT is follows by the names of the columns you want in Read More

NewEngland

Attack Targets

One more post for network security students: The internet is a complex construction of devices and connections that spans the globe. It can be difficult to conceptualize every aspect of the internet to use it securely. By understanding how black hats find targets and how they create attacks against those targets, the cybersecurity defenses we Read More

NewEngland

Elevator Pitch: Is removing explicit personal factors enough to prevent AI bias?

No. Even if explicit personal factors like gender, race, or sexual orientation are removed, AI algorithms can still learn to discriminate based on other variables correlated with these factors. For instance, an algorithm trained on historical hiring data might learn to favor certain keywords or experiences more commonly found on resumes of a particular group, Read More

NewEngland

Cloud Security

Another post for network security students. Cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this digital transformation introduces unique security challenges that must be addressed to protect sensitive data. This blog post will explore the critical aspects of cloud security, providing insights into potential threats, security measures, and best Read More