What security measures are necessary to protect data? Data security involves protecting data from unauthorized access, modification, and disclosure. Key security measures include:
Author: Gary Ackerman
AI Generated Post: The Challenge of Integrating Technology
Generative AI arrived in our schools a few years ago with ChatGPT and our collective concern about its future for our work. In the time since, we have been negotiating its place in education. We seem to be narrowing in on several applications that are useful in making people “smart.” One activity that has focused Read More
Dimensions of Assessment
Three Dimensions of Learning: Imagine the data we would get is we designed school assessment system to focus on three areas: Habits of Effective Learners: Measured using traditional Course Grades, capturing content knowledge, task completion, compliance, and participation. Comparison to Other Populations: Measured using Standardized Tests like SBAC, SAT, and PSAT, providing a benchmark against Read More
Don’t be the Department of “No”
39: Don’t Be The Department of “No” | RSS.com It is conference season for educators. It comes three times per year: In the middle of fall, after the semester has gotten started, but before the end of the term crunch starts. Again, in the middle of the spring semester and finally (to a lesser degree) Read More
On Digital Information
With the arrival of digital electronic computers late in the 20th century, the stability and predictability of necessary literacy and numeracy skills and knowledge evaporated. The ability to know information and to be able to recall it on demand is a skill that is losing importance as online encyclopedias become available on handheld computers. Calculators Read More
Is the AI Hype Over?
Those who have been around for a few years, know that most technology innovations go through a common pattern: I do believe we are ready to begin understanding and integrating generative AI. I come to this conclusion because of these observations: In Vermont, we have a saying: “Let’s see how this sugars off.” It typically Read More
Elevator Pitch on User Accounts
User accounts can be added to one or more groups that are configured on the network operating systems as well. These can be set by whatever rules the network administrator decides; of course, in schools, teachers are often assigned to groups based on the subject areas taught and grade levels taught, so they will be Read More
Elevator Pitch on CIA Triad
Network security would be very easy if no one ever needed to use computers or data. From a security point of view, it is unfortunate that people use networked computers. The reality is that we need networked computers and that data stored on them to do our work as educators. IT designers consider confidentiality, integrity, Read More
An Experiment with AI
A colleague and I have been leading forums on AI at our community college. Once per month, we meet with faculty and once per month with students. The discussions have been rich and we also share tools and ask other to share tools. At our most recent forum, we were exploring Notebook LM. This is Read More
IT Skills & Educators
In the first decade desktop computers were in schools, most teachers had little experience with computer technology, so dedicating professional development resources to train teachers in the basic operation of systems (tasks such launching applications, creating and editing documents, and saving and printing) was appropriate and necessary. Soon thereafter, the local area networks and the Read More