tasks1

Key Performance Indicators and IT

Key performance indicators (KPIs) are measurable values that help organizations track and assess their progress toward achieving specific business objectives. They provide a framework and structure for monitoring performance, making informed decisions, and driving improvements. Information technology leaders who work in schools are well-served to have key performance indicators identified. These are goals that are specific to IT operations, including those related to end user Read More

tasks1

Open Source Licenses

168: Open Source Software Licenses | RSS.com Open-source software is also free to use, but “free” can be applied to its use in two ways. First, it can be used at no cost for the user. We download open-source software, just as well do any software, but installation proceeds without entering account information. Second, users are free to use the software in that they Read More

tasks1

A Brief History of Computers in Schools

A Brief History of Computers in Schools   In the United States, desktop computers arrived in classrooms beginning in the late 1970’s and early 1980’s, which is when they arrived on the consumer market as well. If you walked into one of the classrooms where there were those first desktop computers installed, you probably would have seen one or two computers; nearby, there would have been a box of Read More

tasks1

Teachers and AI, But Not with Students

Artificial intelligence is rapidly becoming a quiet partner in the work teachers do every day. While much of the conversation focuses on collaborative, whole‑school adoption, the reality is that many educators are using AI individually—experimenting on their own, testing tools privately, and integrating them into their workflow long before formal policies or training appear. In Read More

tasks1

ARP Spoofing

A post for students in network security class: ARP spoofing is a powerful technique used by hackers to intercept and view unencrypted web traffic on a local area network (LAN). This attack exploits a fundamental vulnerability in the Address Resolution Protocol (ARP), which the internet uses to map a device’s IP address (where it is Read More

tasks1

Deep Fakes

A blog post for students network security class: Deepfakes represent a modern frontier of digital deception, consisting of counterfeit images, videos, or sounds generated through machine learning algorithms. While these tools can be used for entertainment, they are increasingly weaponized by hackers as social engineering techniques to psychologically influence human behavior. By using technology to Read More

tasks1

Multimedia in Schools

159: Multimedia in Schools Generations of students have created presentations using a series of programs that combine text, images, audio, and video (thus the “multi” in multimedia). Many trace the beginnings of this type of educational software to HyperCard and HyperStudio, programs that available were for Apple computers marketed in schools in the early 1990’s. Interest in multimedia grew when video cards, color displays, audio Read More

tasks1

BYOD and School Networks

165: BYOD and School Networks | RSS.com To minimize the expense of one-to-one initiatives, some schools choose to participate in bring your own device (BYOD) initiatives. This finds schools encouraging students to bring devices they own to school, connecting them to an SSID, and using them for their schoolwork. This can pose several difficulties for IT professionals; security being the most important. Others raise concern about equity as individuals may not be Read More

tasks1

The Computer You Draw: Inside tldraw’s “Natural Language” OS

If you asked someone to design the future of computing, they’d probably picture a sleek brain-computer interface or a 3D spatial reality headset. They probably wouldn’t picture a whiteboard. But tldraw—the team behind the beloved open-source infinite canvas—has been quietly building one of the most radical reimaginings of how we interact with software. It’s called Read More