TechAccpetancePresentation

Learning: It’s All About the Problem

We often see learning as absorbing information, but what if teaching became a dynamic journey of problem-solving? Problems are far more interesting and informative than learning outcomes for motivating students. At its core, effective teaching embraces the “problem-centered principle,” stating learning flourishes when students acquire knowledge and skills by tackling real-world problems or tasks. This Read More

TechAccpetancePresentation

Authentic Curriculum

I was recently asked to comment on curriculum, specifically for community college students. Here is my response: Creating and implementing authentic curriculum is a complex and often unpredictable endeavor, especially when compared to relying solely on textbooks or highly prescriptive sources. Authentic curriculum is designed locally, tailored to specific populations, goals, and community resources, yet Read More

TechAccpetancePresentation

Prequestions: A Little Used Teaching Strategy

Welcome to a discussion on a simple yet incredibly powerful technique to boost your learning and retention: prequestions. Often overlooked, the prequestion effect is a phenomenon supported by cognitive science research that shows asking students questions about learning material before they encounter it significantly enhances their learning. Think of it as preparing your brain, or Read More

TechAccpetancePresentation

Cryptographic Protocols

a post for network security students Network security isn’t just about the hardware and software; it’s about understanding the underlying principles that make digital communication secure. Central to this understanding are cryptographic protocols. These aren’t just obscure algorithms; they are the invisible architects of trust and security in every online interaction, from browsing the web Read More

TechAccpetancePresentation

Threat Actors

A post for students in my network security course In the domain of network security, while the mastery of technical controls such as firewalls, encryption protocols, and intrusion detection systems is paramount, a foundational understanding of potential adversaries and origins of compromise is equally important. This foundational knowledge pertains to the identification and classification of Read More