Administrative/Business Tools


Report Details Increasingly Sophisticated Phishing Attacks and Proxies Targeting Students

In a monthlong study of one U.S. school district with newly implemented PhishID security software, Identity Automation uncovered detailed markers of increasingly sophisticated phishing attacks and dangerous proxy services targeting students, according to a new report out from Identity Automation.

Lenovo Rolls Out New Edu Laptops and Chromebooks, Introduces Devices-as-a-Service Solution

Lenovo has revamped its education technology portfolio, recently introducing new Windows 11 and ChromeOS laptops, new features for its VR Classroom and LanSchool solutions, and a new device-as-a-service option for K–12 schools.

The Best Ed Tech Innovations Will Be Emergent – If We Do This Right

Without minimizing the need to honor students’ privacy rights, we as an ed tech community should also not miss the opportunity to search for the new emergent patterns that will no doubt appear when we look at how students, teachers, and their data all interact. It’s these new patterns, like ripples in the sand, that will likely offer insights into the heretofore most intractable questions in education.

Got Chromebooks? First Steps to Securely and Sustainably Reusing and Recycling School Devices

An expert offers tips for K-12 administrators and their IT teams on how to make the most out of their investment in Chromebooks with security and sustainability in mind, and recommends schools revise their IT equipment policies to address used and end-of-life devices, including Chromebooks.

Tutoring Triumphs in Texas: Ector County ISD's Unique Approach is Yielding Remarkable Results

Over the three years since Ector County ISD launched its tutoring program, the district has achieved remarkable growth, and superintendent Scott Muri recently joined THE Journal Insider podcast host Kristal Kuykendall to share some of the lessons learned during the pilot and implementation, such as its use of outcomes-based tutoring contracts, strictly structured tutoring sessions, and teacher involvement.

Shifting from Paper to the Cloud: How K-12 Schools are Digitizing Operations

Digitization is the key to eliminating backlogs of paper processes made worse by staff shortages and other post-pandemic challenges. Schools can create modern and digitized systems that make documents searchable and accessible — eliminating the time required to file and search through boxes for old student transcripts, test scores, health records, and more.

JG Consulting Unveils Online Superintendent Search Board to Attract Job Candidates

K–12 executive search firm JG Consulting has launched its online Superintendent Search Board to help school districts attract qualified job candidates. National job listings include superintendents, administrators, teachers, counselors, and support staff. Advertising is also available. Three price levels are offered, from free to two paid options.

7 Questions with Lenovo + LanSchool: A One-Stop-Shop Approach to School Technology with an Emphasis on Inclusivity in Classrooms

For THE Journal's 7 Questions Ed Tech Explainer series, Lenovo’s Education Software General Manager Coby Gurr shares how Lenovo’s K–12 division and particularly its classroom management software LanSchool emphasize inclusivity, accessibility, and a holistic, integrated approach to school technology — and how Lenovo EDU’s line of hardware, software, and services aim to provide a “comprehensive learning environment.”

Unsung Heroes Grant Program Now Accepting Applications from K-12 Educators, Staff for Classroom Projects

The Voya Unsung Heroes grant program, which awards $2,000 each to 50 educators to fund innovative classroom projects plus three top awards of up to $25,000, is now accepting applications through April 28, 2023.

After a Cyber Attack: Three Do's and Don'ts for K-12 Leaders and IT Teams

Charlie Sander of cybersecurity firm Managed Methods shares some tips to avoid making a cyber incident on a K-12 school even more costly, for district leaders, risk management planners, and IT practitioners: What to expect and some do’s and don’ts to move forward while minimizing an cyber attack's negative impacts and costly disruptions.

Whitepapers