TheApplicationofTechnologyAcceptancetoEducationalDesign

Elevator Pitch: The New Theory of Disuse

The New Theory of Disuse (NTD): This theoretical framework provides a rationale for why difficulties can be desirable. The NTD characterizes an item in memory by two strengths: Storage Strength: Represents how well learned and interconnected an item is in memory. The theory assumes that storage strength, once accumulated, is never lost . Retrieval Strength: Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Science and Pseudoscience

We often hear claims about what is or isn’t “scientific.” Science holds a distinctive place in modern society; we trust its pronouncements on everything from building bridges to who counts as an expert. Yet, history is full of scientific theories that turned out to be wrong. This leads us to a fundamental question: what exactly Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Large Language Models

Large language models, or LLMs, represent a notable advancement in the field of artificial intelligence. These models are a central topic of any discussion of generative AI which aims to provide an introduction to their workings and significance. Understanding LLMs involves grasping their fundamental principles and the components that enable their capabilities. LLMs are built Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

AI Literate or AI Idiot

AI Literate or AI Idiot  The title of this post deserves an explanation. I wish I were sufficiently clever to have come up with it, but it was crafted by a student. Ernie is a community college student who chairs the Artificial Intelligence Club at the school and has been a collaborator in our efforts Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Data Governance

In today’s world, data is often described as the new oil – a valuable resource capable of driving innovation and fueling business decisions. As a data professional, understanding how to collect, analyze, and report on this data is at the center of your work. However, equally important, and perhaps less discussed, is the critical role Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Data Reports

Yet another post for data analytics students As a data analyst, your work isn’t finished until you can effectively communicate your findings. Reports are the primary tool for sharing the results of your analysis with others. However, not all reports are created equal, and choosing the right type is crucial for conveying your insights clearly Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

AI: Generative and Traditional

78: Generative and Traditional AI Artificial intelligence (AI) has been a part of our lives for years, quietly powering everything from search engines and product recommendations to curated music playlists and predictive text on our phones. Recently, however, the world has been active with discussions about AI, specifically generative AI, which has captured public interest Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Chi-Squared Test

another in my series of posts for students in data analytics class In the realm of data analysis, we often want to determine if there are meaningful connections between different categories or if a sample of data accurately reflects a larger population. This is where chi-squared tests come into play, offering powerful tools for analyzing Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Simple Liner Regression

Have you ever wondered if you could predict the future based on past data? While a crystal ball might be appealing, the world of data analytics offers a powerful and practical tool for making predictions: linear regression. In this blog post, we’ll delve into the fundamentals of this essential technique. At its core, simple linear Read More

TheApplicationofTechnologyAcceptancetoEducationalDesign

Vulnerability Scanning

In the ever-evolving landscape of cybersecurity, knowing your weaknesses is a strength. Organizations invest heavily in building robust defenses, but hidden vulnerabilities can still provide attackers with entry points. Vulnerability scanning is a proactive process that helps identify these weaknesses before they can be exploited, acting like a digital health check for your systems. Executing Read More