Tuesday, June 15, 2010

The main thing


If the first day of the face-to-face portion of the Emerging Instructional Technologies class is any indication of what the next two years are going to be like, bring it on! What more could a person want than a roomful of educators and educator-support-people who love technology and are eager to learn more from an enthusiastic, connected professor?

Well, I can think of a few things that a person could want, such as a dorm room that has live network connectivity and a bathroom that doesn't require you to punch in a numeric code to enter. But that's beside the point.

It makes me sad to hear teachers talk about their desire to use some of the Web 2.0 technologies in their classrooms but being stymied by strict computer and network policies. Those policies prevent access to some websites or prevent the installation of browser plug-ins or other applications.

On the other hand, I've witnessed the mayhem that happens when viruses, malware, spyware, etc. infect a computer or a network, or when a computer slows to a crawl because it's loaded down with junk that eat up the system resources. It's not pretty. And when those things happen, it's usually not the end user who has to clean up the mess.

Still, those of us who work in the information technology areas of educational institutions must remember to keep the main thing the main thing. The mission of the institution is to educate students, and the technology resources must support that mission, not hinder it. This blog post by David Pogue, the technology columnist for the New York Times who could double as a stand-up comedian hits the nail on the head.

Network security is extremely important, but there are ways to minimize the risk by using software tools and methods that didn't exist a few years ago. Note that I said "minimize"---there is no such thing as a guarantee regardless of how strict the policies are.

Teachers, go have a heart-to-heart talk with your IT department and explain to them the potential educational benefits of what you’d like to do. Let them know that you are now more savvy and conscious of suspicious e-mail messages than you were in previous years. Promise to backup your important files elsewhere so that if your computer does fall victim to some nefarious plot, they are welcome to wipe its hard drive clean.

IT directors and network managers, listen to the teachers, provide appropriate warnings and predictions, and do what you can behind the scenes to protect them without crippling them. The next generation of 21st century learners will reap the benefits.
Photo source: http://www.flickr.com/photos/arthur-caranta/2906069843/sizes/s/ licensed under Creative Commons

No comments:

Post a Comment