With this weeks reading, we begin to consider the behind the scenes components of adding technology into the classroom, or the school. Having easy access to the internet can be a blessing and a curse. The ability to incorporate up-to-date information at the click of a button is wonderful, but there are sinister caveats to this world of plenty. The reality is that even though the school may have altruistic uses for the internet, they have to prepare their network and its users for the minefield that the internet can be. Acceptable use policies, avoidance of inappropriate materials for users, firewalls, spyware/virus detectors, and proper equipment that will allow ALL students access are just a few things to keep in mind when making the school internet ready. The book recommends creating a strategic plan that will help the school consider all of its needs and make a plan that will keep them on task, on time, and on budget.
Though I am currently not teaching, I have spent a short time in a classroom in Madison Central High School , in Madison County , as a part of a class, and my husband also works in the IT department for Madison Central. So, I was able to get a little bit of an inside look behind the scenes. I am not sure if this is the case for all schools in Madison County , but at the high school, they use Norton Anti-virus to help protect the individual computers. The system is also set-up with a proxy server, which prevents access to social networking sites, pornographic sites, game websites, and many others. Additionally, you must have system administrator access in order to download any programs to the individual computers—this also includes updating any current software on the system.
Of course, there could always be more protection. To my knowledge, the computers do not currently have firewalls set-up except for what Norton may provide. I also think that have multiple means to hunt out malicious materials already downloaded to you system is a good preventative measure, just in case something does manage to get through and prevents the computer from being accessed. This could be necessary in instances when a teacher, student, or administrator use a jump drive in order to access materials that they could not download from their email. Since viruses, worms, and Trojan horses can still be introduced to new systems through the use of an external hard drive, or even a cd/dvd with corrupted material, it may become important to have those additional levels of protection to prevent the malware from spreading throughout the entire network.
