- Learning: It’s All About the ProblemWe often see learning as absorbing information, but what if teaching became a dynamic journey of problem-solving? Problems are far more interesting and informative than learning outcomes for motivating students. At its core, effective teaching embraces the “problem-centered principle,” stating learning flourishes when students acquire knowledge and skills by tackling real-world problems or tasks. This Read More
- Authentic CurriculumI was recently asked to comment on curriculum, specifically for community college students. Here is my response: Creating and implementing authentic curriculum is a complex and often unpredictable endeavor, especially when compared to relying solely on textbooks or highly prescriptive sources. Authentic curriculum is designed locally, tailored to specific populations, goals, and community resources, yet Read More
- Prequestions: A Little Used Teaching StrategyWelcome to a discussion on a simple yet incredibly powerful technique to boost your learning and retention: prequestions. Often overlooked, the prequestion effect is a phenomenon supported by cognitive science research that shows asking students questions about learning material before they encounter it significantly enhances their learning. Think of it as preparing your brain, or Read More
- Avoid Black Box LearningAI is all the rage right now. Students use it. Faculty complain about it. Bosses are trying to figure out which jobs can be replaced by it. We are all trying to figure out just how this technology will affect us. It is a challenging time, and responsible educators are actively participating our collective negotiation Read More
- Cryptographic Protocolsa post for network security students Network security isn’t just about the hardware and software; it’s about understanding the underlying principles that make digital communication secure. Central to this understanding are cryptographic protocols. These aren’t just obscure algorithms; they are the invisible architects of trust and security in every online interaction, from browsing the web Read More
- Threat ActorsA post for students in my network security course In the domain of network security, while the mastery of technical controls such as firewalls, encryption protocols, and intrusion detection systems is paramount, a foundational understanding of potential adversaries and origins of compromise is equally important. This foundational knowledge pertains to the identification and classification of Read More