Today, URL shortening services and quick response or QR code generation tools are widely available to internet users. While these are useful services when (for example) sharing links to your conference presentation materials with the in-person participants, they can easily be used by phishers for spoofing. Notice in the complete URL, you do have the Read More
Category: Elevator Pitches
#edtech for #edleaders: Malware
Most computer users would not knowingly spread malware, so hackers must use stealth methods to install the software. One example of a brute force attack is bots that search the internet for computers with unpatched operating systems that can be used a backdoors through which malware is installed. One of the most common methods of Read More
#edtech for #edleaders: End of Life
Several factors make it impossible for commercial software developers to update operating systems and applications indefinitely. Even open-source operating systems and applications that are developed by communities of programmers rather than businesses are usually retired. When software is retired, the publishers no longer release security updates. At that point, responsible IT professionals will upgrade the Read More
Elevator Pitch on Data Security
Hackers are individuals or groups who try to gain access to others’ computers. Phishers are individuals and groups who try to trick users into giving them access to a computer system. Both hackers and phishers are generally after either computing capacity or data. In some cases, they want to use our computers for nefarious purposes, Read More
Elevator Pitch: Firewalls
Even before computer viruses and network security became a concern, the idea of a firewall was familiar. We construct them to prevent certain unwanted “things” from passing through. The firewall in your car prevents an engine fire from passing into the passenger compartment. In IT systems, firewalls enhance network security by ensuring only certain types Read More
Elevator Pitch on Aspects of Learning
Human learning has aspects that are cognitive, but it also has social and emotional aspects, and deeper learning requires students connect with the curriculum in all three ways. The emotional and social aspects of human learning appear to be deeply embedded in our nature. It is reasoned our brain evolved to pay attention to what Read More
#edtech for IT: Digital Divides
Since about 2010, one-to-one computing and cloud-based computing have come to dominate school computing. In many schools, students carry Chromebook with them, and sometimes they take them home. (While the market share of educational computing devices is difficult to ascertain, estimates are that Chromebooks represent over 60% of the devices purchased for school users.) Some Read More
Elevator Pitch on Brains and Stress
Stress can be either good for brains or bad for brains, the effect depends on the level of stress that is experienced. What is true for physical stress (exercise) is true of psychological stress: none is bad, some is good, but too much is bad. Stress results in the release of a chemical called cortisol Read More
edtech for IT: Elevator Pitch on Users in Schools
Assumptions about the users’ capacity to operate the devices, adapt to changes, and operate the systems effectively all affect how systems are designed. For those who have experience managing IT in organizations where all the users are adults and those who have completed typical IT programs in schools (including trade schools, community colleges, and universities) Read More
Elevator pitch on gaps in education
Education is a field characterized by gaps: Teachers and school administrators view scholars with suspicion as they believe scholars are disconnected from the realities of the classroom. Scholars are suspicious of teachers and school administrators as they believe educators are unsystematic in their work. Educational theorists advocate for reform of schooling so that students are Read More