home

=Session 1 - Tracking and Assessing Instructional Effectiveness= http://www.makteam.com/
 * Provides a toolset for a Standards Aligned System
 * To assess progress a course portfolio is built
 * Course Outcome Assessment Criteria
 * Based on Common Assessments
 * Key Assignments - Test. etc. that capture objective data on standards

=Session 2 - Content Filtering and Web 2.0=
 * http://www.securedistrict.org/safewired - COSN's site for filtering
 * Example site using Lightspeed TTC

=Session 3 - Cloud Resources=

Practical Approach to Cloud Computing • Unity – Single service includes backup, support, hardware, etc. • Improved Security and Stability • Increased Productivity through internet based solution • Cloud Computing provides disaster recovery and business continuity inherently

CONS • Security issues (real & perceived) • Lack of control • Privacy Concerns • Disparate platforms • Availability and Speed

=Day 2 Keynote:= John Dewey's Book Every teacher is assigned group of 20 students to act as an advisor http://www.essentialschools.org/? http://chrislott.org/story/the-future-of-learning-manifesto-christian-long/ Teach students and not subjects Inquiry based learning http://www.scienceleadership.org/drupaled/mission

=Session 5 - SAS Overview= So the state took the standards and put them in a database... Resources are linked to the standards - nice... This looks very similar in functionality to NetTrekker, which the state stopped funding. How, long before SAS becomes a paid service? Can create assessments based on standards and eligible content. Sample questions are available and can be exported to Word or pdf format. Assessments can be saved in the educator's online portfolio for later use. Current assessments are to be delivered on paper. The online portfolio has unlimited file storage available for teacher use. Any files the teacher wants to use can be stored. Curriculum Mapping Tool - planned for future development.

=Session 6 - Data, Data, Data, Now what?= Create collaborative teams to look at student data and use common assessments with shared results. Using progress monitoring with common assessments that analyzed with Performance Tracker Started with curriculum mapping Utilized professional learning communities Created individual student achievement plans based on student achievement data Interventions were prepared to respond to the student issues Created a curriculum leadership team - mission was to ensure that all students learn. heavily routed in LFS. Did not overtly mention LFS but entire presentation was filled with LFS terms. Utilized common planning periods for teams/departments Curriculum Connector - Curriculum mapping tool embedded within PerformancePathways product.

=Session 7 - Secure Access - What you need to know now.= Access is not driven by the identity of the user, but rather the device Encryption is a start, but not good enough Identity based access is a needed component - 802.11x Both the wired and wireless networks need to be secured Users are the biggest threat to security solutions in place Devices that are not patched and have known vulnerabilities Unauthorized software, software that may misuse resources (P2P), malware Need to integrate multiple systems with different OS, architecture and roles - almost impossible. Move to one network, one approach. Get rid of security sprawl.

NAC - Network Access Control Role Based Networking Endpoint Compliance - done at layer 2 before packets are forwarded Policy Enforcement Guest Network Access

Has to integrate with existing directories. Flexible enough to do role based security based on OU's Must support open standards Must minimize the effect on the end users: Should be customizable to your organizations needs How do you do remediation? - Common issues should be easily remediated from the end user standpoint. Automatically push out AV updates, etc. Comprehensive ACL's should be done at the edge Multi-vendor support

Strategies for today User security training Allow only the latest web browsers, block the exe for older versions Never allow users to run a system as an administrator Don't run as an administrator even to administrate - create multiple admin roles User web mail instead of a mail client

=Session 8 - Cyber Safety= Dud!

=Session 9 - Mobile Learning= Increase in popularity and accessibility mLearning vs. eLearning eLearning takes place on a computer in an online environment where information is or received instantly Mobile Learning expands eLearning to include increased portability, and full mobility Mobile Learning is used for - real time responses, data collection, expanded social networking

Limitations - screen size, limited web (i.e no flash), generally slow internet connections Google and Apple are pushing for html 5 and are refusing Flash support Penn State study found that podcasts did not replace the existing lectures, but acted as a supplement for review and clarification Podcasts were recorded separate from the class session and did not include any questions or discussion Multiple studies have shown anxiety and apprehension on the part of both instructors and students regarding the use of cell phones in the classroom. Study by Seppala and Alamaski (2003) - Teachers interviewed at the course conclusion found 3 themes: convenience, expediency and immediacy. Very few studies and cases available, virtually none in the U.S. Very difficult to answer the question WHY? Why should the investment be made? Why should the teacher do additional work to integrate mobiles? etc. Lessons Learned: Define the goal, don't let budget drive the strategy, invest in infrastructure http://raypastore.com/wordpress

=Session 10 - Monitor your network with Open Source= Nagios - subject of the session http://www.nagios.org/ MRTG is another option http://oss.oetiker.ch/mrtg/ Does notifications and schedules for checks, also does higher level application monitoring Can be configured to suspend monitoring during maintenance windows Prerequisites: application runs in Linux, snmp library fofr some devices, graphics library for web pages, C compiler, Apache Web Server, Postfix mail

Install OVerview: Download nagios, download plugins, create nagios user and group makre sure the is a reference to /etc/init.d/nagio in the etc/rc3.d or rc5.d directory to start nagios automatically after restart config file includes log file location, user and group names, object file locations can handle port flapping notifications with threshholds that will notify on start/stop for crossing the threshhold rather than every status change Monitoring is based on objects: hosts, services, hotgroups, contacts, commands timeperiods Nagios allows templates that will inherent object properties NCSClient++ will allow Nagios to connect remotely to windows services and gather statistics on processes, memory usage, disk space, etc. Contains a mapping function that can do free form, trees and other digrams from GUI. DOES depend on a configuration element called depends_on attached to devices to establish the network hierarchy. Reporting: Availability Reports, Trend Reports, Event Log