Ackerman Curriculum Repository Proposal

Special Use IT in Schools

In addition to the fleets of computers maintained for populations such as students and teachers, schools are places where special purpose computers and peripherals are found. In makerspaces, science laboratories, studios, workshops, and other special teaching spaces, there are computing devices necessary for specialized educational activities. Examples include: 

Ackerman Curriculum Repository Proposal

IT Tradeoffs in Schools

School users are also well-known for trading reliability for functionality and ease. IT professionals know that systems can be configured to perform many more functions than are typically used. Further, many users will use only a fraction of the tools and features available in the applications they use. Of course, using these tools and features Read More

Ackerman Curriculum Repository Proposal

Edtech for IT: Learning Management Systems

Virtual classrooms took on particular importance to teachers and students with the quick pivot to remote teaching necessitated by the COVID pandemic. Even before that, however, virtual classrooms were being managed by school IT professionals and teachers were using them to extend their classrooms and enhance information sharing and interaction. Like other cloud-based infrastructure in Read More

Ackerman Curriculum Repository Proposal

Secure Browsing

Web browsers allow users to select from one of three levels of safe browsing. Each level uses tools to help reduce the potential for risky web browsing. At the standard level, the web browser warns if you are going to site known to contain malware, phish for credentials, or otherwise risk security. Those protection can Read More

Ackerman Curriculum Repository Proposal

#edtech for #edleaders: Passwords

Brute force attacks are one strategy whereby hackers attempt to access systems. A common brute force attack is to attempt to guess passwords. By requiring users have complex passwords—complexity being defined by length and different types of characters—system administrators can minimize the potential that  brute force attack will guess the password. In the example pictured, Read More

Ackerman Curriculum Repository Proposal

Elevator Pitch: Technology Acceptance

For several decades, several variations of the technology acceptance model have been used to explain and predict the use of technology by individuals and within organizations. In general, when users perceive IT to be easy to use, effective for their tasks, and similar to that used by others; they are more likely to use it Read More

Ackerman Curriculum Repository Proposal

IT Policies and Procedures for Different Users

Protocols and practices are ostensibly objective. The same rules apply to all users and, especially those that are controlled by technology are applied with precision. The reality in schools, however, is that not all users have similar capabilities and some protocols and practices appropriate for one group of users may not be appropriate for others. Read More