Ten IT Commandments

Jack M. Wilson

While many of us know Jack M. Wilson as the 25th president of the University of Massachusetts system, in his prior role of VP for Academic Affairs and founding CEO of UMassOnline, he was at the helm of one of the largest and most successful online distance education programs in the country. A nationally and internationally recognized activist for higher education reform, Wilson has led major technology initiatives in both academia and industry and has served on numerous advisory councils, boards, and task forces. His research and activities have attracted over $23 million in funding, and his professional communications have included prolific scholarly writings and more than 200 invited lectures—many of which draw on his experience at the crossroads of technology and higher education.

10. Consider technology an important part of your plan.

  • There is no longer any way to do good scholarship without technology.
  • There is no longer any way to teach good scholarship without technology.
  • Technology is here to stay!

9. Keep an eye on true program needs.

  • Develop a balance between synchronous and asynchronous distributed learning.
  • Don't design an asynchronous learning environment so that all interactions are defined as between student and instructor..
  • Don’t always keep the instructor at the center.

8. Avoid pilots that linger.

  • Design for a large scale; use pilot projects only as a prelude to scaling up.
  • It is easy to design innovative educational experiences that work for small groups.
  • It is harder to address the needs of the 1,000 students taking Calculus I at a large research university.

7. Be cost conscious.

  • Cost is an important aspect of quality.
  • There is no lasting quality if there has been no attention to cost.
  • There are too many examples of high-quality, expensive solutions.

6. Count on Moore's law: "What is hard today is easy tomorrow."

  • Computer processing and bandwidth have consistently improved.
  • Be confident that processing power and bandwidth will continue to improve.

5. Benchmark your plans.

  • Build upon existing examples.
  • Don't merely "automate" the lecture or classroom experience.
  • Find the best examples, and build upon them.

4. Do systematic redesigns.

  • Avoid incremental add-ons.
  • Simply adding a few computer experiences to everything else costs more, is more work for the faculty, and adds to the students' burden.
  • Remember that true innovations change rather than modify systems.

3. Recognize the intrinsic educational value of technology.

  • Helping students learn better is but one value.

2. Build upon research results.

  • Identify research that informs design.
  • Don't try to reinvent the wheel.

1. Restructure around the learner.

  • Never overemphasize technology.
  • Never underemphasize it.

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.