The events I recorded in the papers I wrote as an undergraduate student and in my journal kept during my first few years working as a teacher and the few surviving lesson plans and resource folders from my pre-Internet years (recall that I entered the teaching profession using an Apple IIc computer in 1988), all Read More
Category: Tech for Educators
Where the Rationale for School IT Breaks Down
In my experience, that last point is where school IT decision-making breaks down. Organizations have different strategic goals, and they accomplish those goals by setting different priorities and adopting different strategies. IT professionals who have learned their craft in organizations other than schools are often unfamiliar with the urgency of malfunctioning academic systems. During my Read More
Special Use IT in Schools
In addition to the fleets of computers maintained for populations such as students and teachers, schools are places where special purpose computers and peripherals are found. In makerspaces, science laboratories, studios, workshops, and other special teaching spaces, there are computing devices necessary for specialized educational activities. Examples include:
IT Tradeoffs in Schools
School users are also well-known for trading reliability for functionality and ease. IT professionals know that systems can be configured to perform many more functions than are typically used. Further, many users will use only a fraction of the tools and features available in the applications they use. Of course, using these tools and features Read More
Edtech for IT: Learning Management Systems
Virtual classrooms took on particular importance to teachers and students with the quick pivot to remote teaching necessitated by the COVID pandemic. Even before that, however, virtual classrooms were being managed by school IT professionals and teachers were using them to extend their classrooms and enhance information sharing and interaction. Like other cloud-based infrastructure in Read More
Secure Browsing
Web browsers allow users to select from one of three levels of safe browsing. Each level uses tools to help reduce the potential for risky web browsing. At the standard level, the web browser warns if you are going to site known to contain malware, phish for credentials, or otherwise risk security. Those protection can Read More
Characteristics of IT
When we design IT systems for schools (and for all other organizations), we must address several characteristics to ensure it functions as we need it to:
#edtech for #edleaders: Passwords
Brute force attacks are one strategy whereby hackers attempt to access systems. A common brute force attack is to attempt to guess passwords. By requiring users have complex passwords—complexity being defined by length and different types of characters—system administrators can minimize the potential that brute force attack will guess the password. In the example pictured, Read More
Elevator Pitch: Technology Acceptance
For several decades, several variations of the technology acceptance model have been used to explain and predict the use of technology by individuals and within organizations. In general, when users perceive IT to be easy to use, effective for their tasks, and similar to that used by others; they are more likely to use it Read More
QR and Data Security
Today, URL shortening services and quick response or QR code generation tools are widely available to internet users. While these are useful services when (for example) sharing links to your conference presentation materials with the in-person participants, they can easily be used by phishers for spoofing. Notice in the complete URL, you do have the Read More