tasks1

An Introduction to IT Networks

While you might often think of large corporations or government agencies when considering network security, the truth is, some of the most critical and challenging networks to secure are right under our noses: school IT networks. These networks are essential infrastructure, connecting students and teachers to data, information, and interactions locally and across the Internet. Read More

tasks1

Prompt Engineering

Prompts can be composed of text, images, or both, depending on the model. Fundamentally, prompts get converted into tokens, and the quality of this initial input strongly influences the relevance and accuracy of the model’s response. While there’s no single formula, effective prompts often contain elements like keywords, guidelines, formatting instructions, and examples. Several techniques Read More

tasks1

Large Language Models

91: Large Language Models Large language models, or LLMs, represent a notable advancement in the field of artificial intelligence. These models are a central topic of any discussion of generative AI which aims to provide an introduction to their workings and significance. Understanding LLMs involves grasping their fundamental principles and the components that enable their Read More

tasks1

Five Layers of Educational Technology

118: Layers of Educational Technology Educational technology in schools is often perceived as a single entity, a collection of devices, software, and online platforms. However, beneath this surface simplicity lies a complex, multi-layered system. Effective integration of technology into teaching and learning requires IT leaders to recognize the characteristics of each. Decision-makers, including educators, IT Read More

tasks1

Interaction in Online Classrooms

There are many models of having students interact in online classrooms. Each has its own unique characteristics and purposes These models include: Discussion Boards: These are the most common tools for online interaction, primarily using text. Students create “posts” and respond to others’ posts, creating a “thread” of discussion. While discussion boards can be a Read More

tasks1

Unlocking the Secrets: A Deep Dive into Cryptography

In an increasingly interconnected world, the need to protect sensitive information from unauthorized access has never been more critical. This is where cryptography comes into play. Far from being a niche concept, cryptography is a fundamental building block of modern security, underpinning everything from online banking to secure communication. This post will explore what cryptography Read More

tasks1

Dimensions of Assessment

Three Dimensions of Learning: Imagine the data we would get is we designed school assessment system to focus on three areas: Habits of Effective Learners: Measured using traditional Course Grades, capturing content knowledge, task completion, compliance, and participation. Comparison to Other Populations: Measured using Standardized Tests like SBAC, SAT, and PSAT, providing a benchmark against Read More

tasks1

Don’t be the Department of “No”

39: Don’t Be The Department of “No” | RSS.com It is conference season for educators. It comes three times per year: In the middle of fall, after the semester has gotten started, but before the end of the term crunch starts. Again, in the middle of the spring semester and finally (to a lesser degree) Read More