Ackerman Curriculum Repository Proposal

Where the Rationale for School IT Breaks Down

In my experience, that last point is where school IT decision-making breaks down. Organizations have different strategic goals, and they accomplish those goals by setting different priorities and adopting different strategies. IT professionals who have learned their craft in organizations other than schools are often unfamiliar with the urgency of malfunctioning academic systems. During my Read More

Ackerman Curriculum Repository Proposal

Special Use IT in Schools

In addition to the fleets of computers maintained for populations such as students and teachers, schools are places where special purpose computers and peripherals are found. In makerspaces, science laboratories, studios, workshops, and other special teaching spaces, there are computing devices necessary for specialized educational activities. Examples include: 

Ackerman Curriculum Repository Proposal

IT Tradeoffs in Schools

School users are also well-known for trading reliability for functionality and ease. IT professionals know that systems can be configured to perform many more functions than are typically used. Further, many users will use only a fraction of the tools and features available in the applications they use. Of course, using these tools and features Read More

Ackerman Curriculum Repository Proposal

Edtech for IT: Learning Management Systems

Virtual classrooms took on particular importance to teachers and students with the quick pivot to remote teaching necessitated by the COVID pandemic. Even before that, however, virtual classrooms were being managed by school IT professionals and teachers were using them to extend their classrooms and enhance information sharing and interaction. Like other cloud-based infrastructure in Read More

Ackerman Curriculum Repository Proposal

Secure Browsing

Web browsers allow users to select from one of three levels of safe browsing. Each level uses tools to help reduce the potential for risky web browsing. At the standard level, the web browser warns if you are going to site known to contain malware, phish for credentials, or otherwise risk security. Those protection can Read More

Ackerman Curriculum Repository Proposal

#edtech for #edleaders: Passwords

Brute force attacks are one strategy whereby hackers attempt to access systems. A common brute force attack is to attempt to guess passwords. By requiring users have complex passwords—complexity being defined by length and different types of characters—system administrators can minimize the potential that  brute force attack will guess the password. In the example pictured, Read More

Ackerman Curriculum Repository Proposal

Elevator Pitch: Technology Acceptance

For several decades, several variations of the technology acceptance model have been used to explain and predict the use of technology by individuals and within organizations. In general, when users perceive IT to be easy to use, effective for their tasks, and similar to that used by others; they are more likely to use it Read More