1EdTech Glossary
Key terms and vocabulary.
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
T |
---|
Tool Provider1EdTech interoperability design relies on two important roles, consumer and provider. Consumers and providers can be related to tools, content or services. In LTI 1.x terminology, a Tool Provider provides or hosts the tool to be used in the tool consumer. Examples of Tool Providers include an externally hosted testing platform or servers containing an adaptive learning platform or a virtual lab simulation. In LTI Advantage a Tool Provider is now termed the Tool. A tool "provider" has code to authorize a connection with another tool (a digital bridge.) For example, a CASE Provider opens a digital bridge, so the LMS or LOR can consume (ingest) the CASE frameworks (or states standards.) | |
Transport Layer Security (TLS) ProtocolTLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. The 1EdTech Security Framework mandates the use of either TLS 1.2 (defined in IETF RFC 5246) or TLS 1.3 (defined in IETF RFC 8446). | |
TrustEd AppsTrustEd AppsTM is a standards first program is aimed at facilitating digital ecosystem interoperability. The program consists of three key components:
| |
Trusted Apps Management Suite (TAMS)A set of software tools and dashboards provided by 1EdTech that help institutional members make smart choices regarding their software ecosystem. | |
TrustEd Apps Vetting RubricThe TrustEd Apps program is the 1dTech process of vetting applications and certifying them for data privacy using the rubric which was collaboratively developed by the 1EdTech community. The TrusteEd App Vetting Rubric covers the base set of questions that K-12 districts and higher ed institutions need to ask when vetting an application's data privacy policy and terms of use. To establish this series of "must ask" questions, the participants compared all of the questions collected from K-12 districts, higher education institutions, and external organizations and selected all of the questions that were similarly being asked by each group. The main objective of the rubric is to develop a baseline for evaluating a product's data privacy protections that an institution may use as a component of its own application review process. | |
U |
---|
Uniform Resource Identifier (URI)the abbreviation for Uniform Resource Identifier. URI is a unique sequence of characters that identifies a logical or physical resource used by web technologies. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books (from Wikipedia). Some URIs provide a means of locating and retrieving information resources on a network (either on the Internet or on another private network, such as a computer filesystem or an Intranet); these are URLs. | |
Uniform Resource Locator (URL)the abbreviation for Uniform Resource Locator. URLs, colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it (Wikipedia). A URL is a specific type of URI, although many people use the two terms interchangeably. URLs occur most commonly to reference web pages (http) but are also used for file transfer (ftp), email (mailto) and many other applications. | |
V |
---|
ValidationThe process of checking that a piece of content/data adheres to a technical specification. This is commonly a subset of certification. Some examples are content based specifications like QTI or Common Cartridge. | |
Verifiable Credentials (VCs)Verifiable Credentials is an open standard by W3C for digital credentials. The credentials can represent information found in physical credentials, such as a passport or license, as well as new things that have no physical equivalent, such as ownership of a bank account, Comprehensive Learner Records, and Open Badges. They have numerous advantages over physical credentials, most notably that they're digitally signed, which makes them tamper-resistant and instantaneously verifiable. Holders of verifiable credentials can generate verifiable presentations and then share these verifiable presentations with verifiers to prove they possess verifiable credentials with certain characteristics. | |