The largest district in Iowa distributed almost 21,000 laptops to students during April to enable them to attend classes online.
Zoom has some new competition. Google has just made premium functionality in its online video meeting software freely available to anybody with a Google email account.
As educators delve into the world of remote and online learning, we must be mindful of the need to retain professional boundaries at the same time as working to maintain a high level of support for students.
Nepris, which produces a library of career videos and sets up industry connections between industry and classrooms, has launched a "virtual classroom," that combines real-time instruction with K-12 classroom management functionality.
Sal Khan, the founder of Khan Academy, comments on digital equity; why the internet has just become a major need, not just a want; and how school could change for the better next fall.
Most K-12 educators are still not ready to teach online. It would be foolhardy to overlook this reality.
Doing school work remotely is different from handling it in-person. For one, teachers can't necessarily see how a student is accomplishing class work and may therefore make faulty assumptions about how it was done; and two, the education technology that facilitates online learning collects data on the student and the interactions, frequently without the student even knowing, let alone opting in.
Make sure your district is covering the legal basics as you develop your remote instruction efforts.
CrossBraining has launched an enhanced version of its program for experiential learning and assessment.
Amazon Web Services (AWS) Education has launched a set of free resources intended to help teachers and faculty in K-20 with their transitions to remote teaching and learning.
To gain deeper insights into the state of application security, Cybersecurity Insiders conducted an in-depth study in partnership with Cisco in July 2022. The resulting report reveals the latest application security trends, how organizations protect critical applications, and the tools and best practices cybersecurity professionals prioritize.