Yochai Benkler, a professor at Harvard Law School (2006) observed “the change brought about by the networked information environment is deep. It is structural. It goes to the very foundations of how liberal markets and liberal democracies have coevolved for almost two centuries” (p. 1). Reference Benkler, Y. (2006). The wealth of networks: How social Read More
Category: Technology
Vulnerabilities and Their Effects
My inbox and feeds have been filled with stories of the threat posed by a widely-used video conferencing client. In simple terms, those who installed a piece of software use a specific tool can have their webcams controlled by others. This is clearly a privacy concern… I will simply stop here so this does not Read More
Thoughts on Decades in #edtech
For more than 30 years, I have considered myself a part of the NEMS community. I attended conferences early in my career. Later, as I was completing my degrees, I presented master’s thesis and doctoral studies at numerous conferences. I served in leadership positions within the organization, and always found the community quick to challenge Read More
Teachers’ Web Presence
Schools have a responsibility to ensure each educator has a functioning account and sufficient access and storage space to maintain this web presence on web servers provided by the school. Thing to remember about your web presence: Vet web sites before you link. Pay attention to language, bias, and discrimination that may not have been Read More
Digital Learners
The world really has changed. The young people coming into your classroom are connected, they expect information and interaction quickly. They like video, it engages them (you may not like it, but it is true). They bully each other over digital networks (at least about 35% of the kids in middle school do). They support Read More
Password Security
With the growing importance of accounts and the growing amount of information and communication that occurs on digital networks, password security is becoming very important. In the same way that you would not leave your house keys around for anyone to use your house, you should not leave your password around for anyone to use Read More
Diversity of Computing
In recent years, education (especially K-12 schools) have adopted Google Suite and Chromebooks is serious way. I understand that… these devices are inexpensive and easy to manage and allow the difficult work of managing network operating systems to be “outsourced.” I do think this is being adopted with little skepticism, reflection, or consideration for what Read More
Someone Please Call These People and Tell Them it is 2019.
More than 25 years ago, when I first started working with computers in schools in a serious way, we were all trying to learn how these new devices were going to work out. We did not know that we were going to be carrying around the Internet (we didn’t even know about the Internet!) in Read More
A View of Technology
Historians of technology recognize the collection of human technologies includes both hard technologies and soft technologies. Hard technologies include the artifacts—from stone axes to automobiles to computers—that humans have built and that can be held and manipulated. Soft technologies include those practices—from language to banking to computer software—that function as technologies but that cannot actually Read More
#edtech for #edleaders: Some IT Network Vocabulary
The adjectives “robust” and “reliable” are used to describe IT networks. Robust describes the capacity of the network to connect users and provided them with the network information each request in a timely manner. A robust network will allow many users in a classroom to connect with little delay, and there will be little latency Read More