tasks1

Vulnerabilities and Their Effects

My inbox and feeds have been filled with stories of the threat posed by a widely-used video conferencing client. In simple terms, those who installed a piece of software use a specific tool can have their webcams controlled by others. This is clearly a privacy concern… I will simply stop here so this does not Read More

tasks1

Thoughts on Decades in #edtech

For more than 30 years, I have considered myself a part of the NEMS community. I attended conferences early in my career. Later, as I was completing my degrees, I presented master’s thesis and doctoral studies at numerous conferences. I served in leadership positions within the organization, and always found the community quick to challenge Read More

tasks1

Teachers’ Web Presence

Schools have a responsibility to ensure each educator has a functioning account and sufficient access and storage space to maintain this web presence on web servers provided by the school. Thing to remember about your web presence: Vet web sites before you link. Pay attention to language, bias, and discrimination that may not have been Read More

tasks1

Digital Learners

The world really has changed. The young people coming into your classroom are connected, they expect information and interaction quickly. They like video, it engages them (you may not like it, but it is true). They bully each other over digital networks (at least about 35% of the kids in middle school do). They support Read More

tasks1

Password Security

With the growing importance of accounts and the growing amount of information and communication that occurs on digital networks, password security is becoming very important. In the same way that you would not leave your house keys around for anyone to use your house, you should not leave your password around for anyone to use Read More

tasks1

Diversity of Computing

97: Diversity of Computing In recent years, education (especially K-12 schools) have adopted Google Suite and Chromebooks is serious way. I understand that… these devices are inexpensive and easy to manage and allow the difficult work of managing network operating systems to be “outsourced.” I do think this is being adopted with little skepticism, reflection, Read More

tasks1

A View of Technology

Historians of technology recognize the collection of human technologies includes both hard technologies and soft technologies. Hard technologies include the artifacts—from stone axes to automobiles to computers—that humans have built and that can be held and manipulated. Soft technologies include those practices—from language to banking to computer software—that function as technologies but that cannot actually Read More