web site3

#edtech for #edleaders: Passwords

Brute force attacks are one strategy whereby hackers attempt to access systems. A common brute force attack is to attempt to guess passwords. By requiring users have complex passwords—complexity being defined by length and different types of characters—system administrators can minimize the potential that  brute force attack will guess the password. In the example pictured, Read More

web site3

#edtech for #edleaders: End of Life

Several factors make it impossible for commercial software developers to update operating systems and applications indefinitely. Even open-source operating systems and applications that are developed by communities of programmers rather than businesses are usually retired. When software is retired, the publishers no longer release security updates. At that point, responsible IT professionals will upgrade the Read More

web site3

Elevator Pitch: Firewalls

Even before computer viruses and network security became a concern, the idea of a firewall was familiar. We construct them to prevent certain unwanted “things” from passing through. The firewall in your car prevents an engine fire from passing into the passenger compartment. In IT systems, firewalls enhance network security by ensuring only certain types Read More

web site3

#edtech for IT: Digital Divides

Since about 2010, one-to-one computing and cloud-based computing have come to dominate school computing. In many schools, students carry Chromebook with them, and sometimes they take them home. (While the market share of educational computing devices is difficult to ascertain, estimates are that Chromebooks represent over 60% of the devices purchased for school users.)  Some Read More

web site3

edtech for IT: Elevator Pitch on Users in Schools

Assumptions about the users’ capacity to operate the devices, adapt to changes, and operate the systems effectively all affect how systems are designed. For those who have experience managing IT in organizations where all the users are adults and those who have completed typical IT programs in schools (including trade schools, community colleges, and universities) Read More