Get our RSS feed here!
Need Advice on Tech Ed?That's what we are here for. We want to help teachers and educators integrate technology in the classroom in sensible and relevant ways. Just drop us a line by commenting on any of our posts and we will get back to you as soon as we can. And don't get stressed out...crack open a cold one on us :o)
Searching for an article?
Author Archives: tdeprato
I was having a conversation with a tech director from another school , and we were discussing budgets and resources. The amounts were fairly staggering for bandwidth, subscriptions, and network support for content management and VPN. Shortly after the conversation, I started … Continue reading
I was reading an article on Slashdot, by far my favorite website. The Slashdot posting linked to this original article, The programming talent myth. The article discusses this perception that programmers are either rock-star-ninjas or barely able to string to strings … Continue reading
I have been using various versions of Microsoft education solutions since 2007. I am also quiet adept at developing online Sharepoint solutions for business processes, writing custom scripts to make accessing Microsoft resources easier, and by-passing much of the fake … Continue reading
Consider this question: If you want to run an event, start a new curriculum, communicate better with organisational stakeholders, audit for efficiency, train a group of people economically, or simply show a movie to a large group of people, would … Continue reading
This is one of those posts that I may regret writing in a few months. It is more of a plan than a post, and a plan I intend to sell with significant confidence. Starting in the fall, when students … Continue reading
This week I read a post called, “9 truths that computer programmers know that most people don’t.“, by Macleod Sawyer . Below is a summary of Mr. Sawyer’s nine points about programmers and programming, and by the way, he is 17 … Continue reading
A whitelist is a a list of users, IP address, etc. that have permission to do something, and a blacklist is just the opposite. For example, organizations routinely blacklist websites that employees should not use. In a BYOD (Bring Your … Continue reading
I was listening to an older episode of This Week in Tech (TWIT), and one of the hosts said, and I am paraphrasing, “we are all walking around with supercomputers in our pockets.” Then I started hearing people imply this … Continue reading
Please note: These “Devil’s Advocate” posts are not my views or daily practice. However, as an exercise I think we all need to slow down and ask ourselves if we are doing the correct things in the correct ways. In … Continue reading
I find it to be part of the human condition that we are always guilty of accepting things as truth that are often unproven theories that appear to work well. I also find it common that process that … Continue reading