Generations of students have created presentations using a series of programs that combine text, images, audio, and video (thus the “multi” in multimedia). Many trace the beginnings of this type of educational software to HyperCard and HyperStudio, programs that available were for Apple computers marketed in schools in the early 1990’s. Interest in multimedia grew when video cards, color displays, audio cards, and speakers along with the computing capacity Read More
Category: Technology
A Story About Technology Leaders in School
I once coached a technology coordinator who was fond of saying, “I built what they asked for, it they asked for the wrong thing, that is not my problem.” He used it whenever the educators decided the system they wanted wasn’t exactly what they wanted and they asked him to modify the plans. I tried to get Read More
BYOD and School Networks
To minimize the expense of one-to-one initiatives, some schools choose to participate in bring your own device (BYOD) initiatives. This finds schools encouraging students to bring devices they own to school, connecting them to an SSID, and using them for their schoolwork. This can pose several difficulties for IT professionals; security being the most important. Others raise concern about equity as individuals may not be able to afford their own devices or Read More
The Computer You Draw: Inside tldraw’s “Natural Language” OS
If you asked someone to design the future of computing, they’d probably picture a sleek brain-computer interface or a 3D spatial reality headset. They probably wouldn’t picture a whiteboard. But tldraw—the team behind the beloved open-source infinite canvas—has been quietly building one of the most radical reimaginings of how we interact with software. It’s called Read More
The Ethics of Educational Platforms: Data, Privacy, and Technoethical Audits
152: The Ethics of Educational Platforms: Data, Privacy, and Technoethical Audits I am reviewing some recent books and chapters I have written as I prepare my next book. As I review, I am have AI blog posts. This is an example. The modern school is fundamentally dependent on digital technology for nearly every aspect of Read More
Comfort Zone Technology
One of the challenges of being a school technology leader (and probably in other fields as well, but my area of greatest expertise is in education) is what I (and probably others) call “Comfort Zone Technology.” Here is the general situation: A new leader is hired into whatever is their field. It may be in Read More
Supporting Education in Rural Schools With Open Source Technology
157: Supporting Education in Rural Schools With Open Source Technology I’m messing around with rehashing my old writing with AI… here is an example from a chapter I wrote several years ago. In the chapter, I described several projects in which we supported education in rural areas using open source technology. Rural educators and school Read More
Open Source Technology
I’m messing around with rehashing my old writing with AI… here is an example from a chapter I wrote several years ago Open-source technology is defined by its dimensions of transparency and freedom. This type of software is produced by a growing community and has begun to compete with and complement commercial products in both Read More
Supporting New Teachers with Open Source Technology
I’m messing around with rehashing my old writing with AI… here is an example from a chapter I wrote several years ago Educational environments today demand that teachers constantly evolve their curriculum to reflect rapidly changing content expectations and new discoveries from the learning sciences. For educators who are developing previously untaught curricula or using Read More
Gathering Organizational Intelligence for Network Security
a post for network security students At its core, intelligence gathering supports the broader objective of evaluating security risks. A robust cybersecurity program rests on a thorough understanding of the technology environment and the external threats it faces. Recall that risk exists only when both a threat and a corresponding vulnerability are present. Intelligence gathering Read More