6 Quick Responses to Faculty Questions

When faculty members come to the Instructional Technology and Media Services team at NJIT with requests, problems, and questions, here’s how the staffers respond:

“I want my students to create audio presentations….” Audacity (free; audacity.sourceforge.net), a program for creating audio presentations in podcast format.

“I want my students to showcase their work….” Freebies WordPress (wordpress.org) for blog-like portfolios and Mahara (mahara.org) for more formal e-portfolios.

“We need to bring in students from other schools (or countries) to participate in this activity….” Wimba (not a freebie; wimba.com) for remote videoconferencing.

“I don’t want to post my lectures to YouTube because that content belongs to me….” Use the private area of iTunes U (free; apple.com/education/itunes-u) that restricts access to students registered for that particular course.

“I can’t get my computer to do…” Camtasia Relay (techsmith.com) for having instructors record what they’re doing on their computers and then send in the sample to get help; and LogMeIn Rescue (logmeinrescue.com) for web-based remote support, when a team member needs to “lay hands” upon the computer. (Neither is free.)

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • row of students using computers in a library

    A Return to Openness: Apereo Examines Sustainability in Open Source

    Surprisingly, on many of our campuses, even the IT leadership responsible for the lion's share of technology deployments doesn't realize the extent to which the institution is dependent on open source. And that lack of awareness can be a threat to campuses.

  • abstract pattern of cybersecurity, ai and cloud imagery

    OpenAI Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    New Cloud Security Auditing Tool Utilizes AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has announced a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • geometric grid of colorful faculty silhouettes using laptops

    Top 3 Faculty Uses of Gen AI

    A new report from Anthropic provides insights into how higher education faculty are using generative AI, both in and out of the classroom.