by Tyler Kron-Piatek | Nov 13, 2025 | Adjuncts, Faculty, Online Learning, Staff, Students
Have new graduate students starting in your program this upcoming semester? Have them start the semester off right by having them join one of the Graduate Student Technology sessions! These sessions introduce students to D2L, My Canisius, Google Drive, and more!...
by Tyler Kron-Piatek | Nov 11, 2025 | Adjuncts, Faculty, Innovation, Students, Technology in Teaching & Learning
Looking to make AI-resistant discussions? Or simply want to make sure that students have read an article or YouTube video? Or want to use something a little more interesting than a Discussion board? Hypothes.is may be what we are looking for! Hypothes.is is a Social...
by Tyler Kron-Piatek | Nov 11, 2025 | Adjuncts, Faculty, Online Learning, Students, Technology in Teaching & Learning
Final exams are fast approaching! Here are some important dates: Reading Day this year is December 5th Final exams starting December 8th Grades are due December 17th It may also be useful to review these features of D2L Quizzes and Dropboxes. D2L...
by Tyler Kron-Piatek | Oct 29, 2025 | Adjuncts, Faculty, Students, Technology in Teaching & Learning
Copyleaks offers three different “levels” of sensitivity for AI Content Detection Scanning: Level 1: The most basic (and, likely, most inaccurate) and fastest scan level. This level only detects content that is directly copied and pasted from AI, without any edits....
by Tyler Kron-Piatek | Oct 27, 2025 | Adjuncts, Faculty, Staff, Students
We are not talking about the recreational enjoyment, we are talking about someone attempting to fool you into giving up your credentials. According to the Verizon Data Breach Report, phishing accounted for 12% of breaches involving stolen credentials in...
by Tyler Kron-Piatek | Oct 20, 2025 | Adjuncts, Faculty, Staff, Students
The 2023 Verizon Data Breach Investigations Report (DBIR) found that 81% of confirmed breaches involved stolen or compromised credentials. This suggests that a large portion of the breaches can be attributed to weak, reused or stolen passwords. Passwords...