In the rapidly evolving landscape of artificial intelligence, the conversation often centers on cutting-edge algorithms, computational power, and the impressive feats machines can now accomplish. But what happens when these incredibly capable systems need to operate in the messy, unpredictable world of human beings? In Chapter 13 of “Possible Minds,” titled “Putting the Human into Read More
Category: Technology
Knowledge & Information
I just discovered this from a piece I wrote about 10 years ago. It seems timely given today’s fascination with generative AI. As has been established, the instructionism of the 20th century was designed to transfer information into student’s brains. Educative experiences necessitate a more sophisticated purpose for teaching. Data and information, which are the Read More
Prompt Engineering
Prompts can be composed of text, images, or both, depending on the model. Fundamentally, prompts get converted into tokens, and the quality of this initial input strongly influences the relevance and accuracy of the model’s response. While there’s no single formula, effective prompts often contain elements like keywords, guidelines, formatting instructions, and examples. Several techniques Read More
Retrieval-Augmented Generation (RAG)
Retrieval-Augmented Generation (RAG) Generative AI (GenAI) has burst onto the scene, capturing global enthusiasm and driving the next wave of digital transformation. At the heart of many GenAI applications are Large Language Models (LLMs), powerful AI models trained on vast amounts of text data to understand and generate human-like text. LLMs, like OpenAI’s GPT series, Read More
On Professional Development Models for #edtech
Recognizing that teachers are flexible professionals who specialize in using technology to support teaching and learning require on-going opportunities for professional learning is essential for school and technology leaders. This professional learning will be characterized by a mix of self-selected and self-defined learning (based on one’s expertise and understanding of current need) and new ideas, Read More
Cloud Security
Another post for network security students. Cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this digital transformation introduces unique security challenges that must be addressed to protect sensitive data. This blog post will explore the critical aspects of cloud security, providing insights into potential threats, security measures, and best Read More
Elevator Pitch: Necessity and Invention
David Nye argues that the adage “necessity is the mother of invention” is often the opposite of what is observed. He suggests that humans don’t just invent technologies to meet existing needs; instead, they often redefine what is necessary through their inventions. In essence, technology creates new needs and desires, rather than simply fulfilling pre-existing Read More
Five Layers of Educational Technology
Educational technology in schools is often perceived as a single entity, a collection of devices, software, and online platforms. However, beneath this surface simplicity lies a complex, multi-layered system. Effective integration of technology into teaching and learning requires IT leaders to recognize the characteristics of each. Decision-makers, including educators, IT professionals, and school leaders make Read More
Ransomware: Understanding the Threat and How to Defend Against It
Another post for network security students. Ransomware is a type of malicious software that holds a computer system hostage by encrypting its files. After encryption, the ransomware typically demands payment, often in cryptocurrency, in exchange for the decryption key. This form of cyberattack can cripple individuals, businesses, and even critical infrastructure, making it a significant Read More
Data Privacy
Yet one more for network security students. In today’s hyper-connected world, data privacy has emerged as a critical concern for individuals and organizations alike. The amount of personal data collected, stored, and used has grown exponentially, raising questions about who has access to this information, how it’s being used, and what rights individuals have over Read More