In addition to the fleets of computers maintained for populations such as students and teachers, schools are places where special purpose computers and peripherals are found. In makerspaces, science laboratories, studios, workshops, and other special teaching spaces, there are computing devices necessary for specialized educational activities. Examples include:
Category: Tech for Educators
IT Tradeoffs in Schools
School users are also well-known for trading reliability for functionality and ease. IT professionals know that systems can be configured to perform many more functions than are typically used. Further, many users will use only a fraction of the tools and features available in the applications they use. Of course, using these tools and features Read More
Edtech for IT: Learning Management Systems
Virtual classrooms took on particular importance to teachers and students with the quick pivot to remote teaching necessitated by the COVID pandemic. Even before that, however, virtual classrooms were being managed by school IT professionals and teachers were using them to extend their classrooms and enhance information sharing and interaction. Like other cloud-based infrastructure in Read More
Secure Browsing
Web browsers allow users to select from one of three levels of safe browsing. Each level uses tools to help reduce the potential for risky web browsing. At the standard level, the web browser warns if you are going to site known to contain malware, phish for credentials, or otherwise risk security. Those protection can Read More
Characteristics of IT
When we design IT systems for schools (and for all other organizations), we must address several characteristics to ensure it functions as we need it to:
#edtech for #edleaders: Passwords
Brute force attacks are one strategy whereby hackers attempt to access systems. A common brute force attack is to attempt to guess passwords. By requiring users have complex passwords—complexity being defined by length and different types of characters—system administrators can minimize the potential that brute force attack will guess the password. In the example pictured, Read More
Elevator Pitch: Technology Acceptance
For several decades, several variations of the technology acceptance model have been used to explain and predict the use of technology by individuals and within organizations. In general, when users perceive IT to be easy to use, effective for their tasks, and similar to that used by others; they are more likely to use it Read More
QR and Data Security
Today, URL shortening services and quick response or QR code generation tools are widely available to internet users. While these are useful services when (for example) sharing links to your conference presentation materials with the in-person participants, they can easily be used by phishers for spoofing. Notice in the complete URL, you do have the Read More
IT Policies and Procedures for Different Users
Protocols and practices are ostensibly objective. The same rules apply to all users and, especially those that are controlled by technology are applied with precision. The reality in schools, however, is that not all users have similar capabilities and some protocols and practices appropriate for one group of users may not be appropriate for others. Read More
IT Policies and Procedures
The policies that guide the definition of IT-related protocols and procedures are also affected by rules that regulate school operations. Because many IT users are children, and much of the data collected and stored by schools are about children, school and IT leaders are obligated to conform to certain laws and regulations that vary by Read More