aws

How Malware Protection Works

Because it is installed through stealth methods, one usually does not know their computer is infected, or even that a file which appears benign is in fact malware. Both IT professionals who manage enterprise networks and the individuals who manage desktop and laptop computers for their own use have options for installing and configuring software Read More

aws

IT Tradeoffs in Schools

School users are also well-known for trading reliability for functionality and ease. IT professionals know that systems can be configured to perform many more functions than are typically used. Further, many users will use only a fraction of the tools and features available in the applications they use. Of course, using these tools and features Read More

aws

Edtech for IT: Learning Management Systems

Virtual classrooms took on particular importance to teachers and students with the quick pivot to remote teaching necessitated by the COVID pandemic. Even before that, however, virtual classrooms were being managed by school IT professionals and teachers were using them to extend their classrooms and enhance information sharing and interaction. Like other cloud-based infrastructure in Read More

aws

Secure Browsing

Web browsers allow users to select from one of three levels of safe browsing. Each level uses tools to help reduce the potential for risky web browsing. At the standard level, the web browser warns if you are going to site known to contain malware, phish for credentials, or otherwise risk security. Those protection can Read More

aws

Types of Tests

There are two types of tests that are typically administered to students: standardized and standards based. For IT professionals who are designing systems to administer the tests, there is no difference; devices must be able to establish reliable and secure connections to the servers where the test is housed, user accounts must be created, and Read More

aws

Who Decides IT in Schools?

I’ve seen the requests from many desktop support teams: “Before you add technology to grants, please include us in your planning.” I understand their rationale. They are responsible for installing, configuring, and managing it. It must integrate with existing systems and be reliable, robust, and secure. I would be sensitive to their requests and I Read More