46: Bridging the Gap: Educational Theory and Practice Education is one of several soft technologies that share an interesting trait: The scholars who discover the science behind the natural phenomena that are the basis of the technology and the practitioners who apply that science to the human purpose are different people. Other examples of human Read More
Author: Gary Ackerman
Wireless Network Security
Another post for my network security students, but you can read it too 🙂 Wireless technology has become an integral part of our daily lives, both personally and professionally. From smartphones and laptops to tablets and IoT devices, wireless networks provide the convenience of accessing information, communicating, and controlling devices without the constraints of physical Read More
AI in Education
AI has the potential to make education more accessible and equitable. Here’s how: However, there are concerns about data collection, privacy, and transparency, as well as potential bias in AI decision-making. It’s important to address these concerns to ensure that AI is used to promote equity and not exacerbate existing inequalities.
Concerns About AI in Education
A brief post for upcoming presentations. There are several concerns regarding the use of AI in education, particularly related to data privacy, potential for bias, and the need for careful implementation. Data Privacy and Transparency: The collection of student data, including personal and biological information, raises concerns about privacy and security. For example, the use Read More
Unlocking the Secrets: A Deep Dive into Cryptography
In an increasingly interconnected world, the need to protect sensitive information from unauthorized access has never been more critical. This is where cryptography comes into play. Far from being a niche concept, cryptography is a fundamental building block of modern security, underpinning everything from online banking to secure communication. This post will explore what cryptography Read More
Thinking About Science and Popper
Karl Popper has significantly influenced how people think about science by emphasizing the importance of falsifiability as a way to distinguish between genuine science and pseudoscience. Popper argued that a good scientific theory should be bold in its claims and open to being disproven by observational evidence. According to Popper, scientists should actively seek to Read More
Elevator Pitch: Social Issues Surrounding Computer Networks
The social issues surrounding the use of computer networks are numerous and complex. Networks can be used to spread offensive content that some believe should be censored. Similarly, they enable the distribution of copyrighted material, leading to conflicts over enforcement. Network operators and governments are able to monitor communications, raising questions around privacy rights. The Read More
Some CLI for Cybersecurity
The document describes several useful tools and techniques: These tools are essential for network diagnosis, analysis, and security testing.
Wicked Technologies: What AI Says
I uploaded a chapter from my 2015 book on wicked technologies to AI and had it summaries if for me. It did an adequate job: The term “wicked technology” refers to the complex and multifaceted nature of education as a system. Traditional planning models, which focus on setting goals and measuring outcomes against pre-defined standards, Read More
Social Engineering Threats
Social engineering techniques are methods used to deceive individuals into divulging confidential information or performing actions that could compromise security. Some common techniques include: