Browse the glossary using this index

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  ...  12  13  14  15  16  17  18  19  20  21  (Next)
  ALL

T

Tool Provider

1EdTech interoperability design relies on two important roles, consumer and provider. Consumers and providers can be related to tools, content or services. In LTI 1.x terminology, a Tool Provider provides or hosts the tool to be used in the tool consumer.  Examples of Tool Providers include an externally hosted testing platform or servers containing an adaptive learning platform or a virtual lab simulation. In LTI Advantage a Tool Provider is now termed the Tool.

A tool "provider" has code to authorize a connection with another tool (a digital bridge.)  

For example, a CASE Provider opens a digital bridge, so the LMS or LOR can consume (ingest) the CASE frameworks (or states standards.)


Tool Use Profile

one of the Metric Profiles defined in the 1EdTech Caliper Standard. The Caliper Tool Use Profile models an intended interaction between a user and a tool. In other words, when a person utilizes an application/tool in a manner that the application determines to be its intended use for learning. An app that implements the Tool Use Profile can send events indicating such usage. The Tool Use Profile enables the gathering of basic usage information. It provides an easy way to get started with a base level of instrumentation by allowing the learning tool to determine its use. Any learning app can be instrumented using this profile to detect when a learner accesses the tool and uses it in the way it was intended.


Transport Layer Security (TLS) Protocol

TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. The 1EdTech Security Framework mandates the use of either TLS 1.2 (defined in IETF RFC 5246) or TLS 1.3 (defined in IETF RFC 8446).




TrustEd Apps

TrustEd AppsTM is a standards first program is aimed at facilitating digital ecosystem interoperability. The program consists of three key components:

  • Continuous support services, including targeted technical resources and training for both edtech suppliers and school districts
  • A new compatibility certification for edtech suppliers and school districts enabling verification of live product integrations
  • A pledge of support for making open standards the first and primary choice for integrations.


Trusted Apps Management Suite (TAMS)

A set of software tools and dashboards provided by 1EdTech that help institutional members make smart choices regarding their software ecosystem.

Learn more here.


TrustEd Apps Vetting Rubric

The TrustEd Apps program is the 1dTech process of vetting applications and certifying them for data privacy using the rubric which was collaboratively developed by the 1EdTech community. The TrusteEd App Vetting Rubric covers the base set of questions that K-12 districts and higher ed institutions need to ask when vetting an application's data privacy policy and terms of use. To establish this series of "must ask" questions, the participants compared all of the questions collected from K-12 districts, higher education institutions, and external organizations and selected all of the questions that were similarly being asked by each group. The main objective of the rubric is to develop a baseline for evaluating a product's data privacy protections that an institution may use as a component of its own application review process.


U

Uniform Resource Identifier (URI)

the abbreviation for Uniform Resource Identifier.

URI is a unique sequence of characters that identifies a logical or physical resource used by web technologies. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books (from Wikipedia). Some URIs provide a means of locating and retrieving information resources on a network (either on the Internet or on another private network, such as a computer filesystem or an Intranet); these are URLs.


Uniform Resource Locator (URL)

the abbreviation for Uniform Resource Locator.

URLs, colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it (Wikipedia). A URL is a specific type of URI, although many people use the two terms interchangeably. URLs occur most commonly to reference web pages (http) but are also used for file transfer (ftp), email (mailto) and many other applications.


V

Validation

The process of checking that a piece of content/data adheres to a technical specification. This is commonly a subset of certification. Some examples are content based specifications like QTI or Common Cartridge. 


Verifiable Credentials (VCs)

Verifiable Credentials is an open standard by W3C for digital credentials. The credentials can represent information found in physical credentials, such as a passport or license, as well as new things that have no physical equivalent, such as ownership of a bank account, Comprehensive Learner Records, and Open Badges. They have numerous advantages over physical credentials, most notably that they're digitally signed, which makes them tamper-resistant and instantaneously verifiable. Holders of verifiable credentials can generate verifiable presentations and then share these verifiable presentations with verifiers to prove they possess verifiable credentials with certain characteristics.



Page: (Previous)   1  ...  12  13  14  15  16  17  18  19  20  21  (Next)
  ALL