Google soon will be rolling out a new service, called Expeditions, that could take virtual field trips to a whole new level — and the company is accepting requests from educators to pilot the technology in their classrooms this year.
Ed tech company Versal has added mobile functionality to its online course authoring tool, allowing users of Android and iOS devices to access courses and via a new mobile player.
The University of Phoenix will now offer a special doctorate in education specifically for teachers in Ohio.
Each of the standards-aligned courses for grades 3 through 5 is designed by educators and includes songs, video and games.
More than 75 percent of school districts are using blended and online learning for credit recovery and to expand course offerings, according to a new report from the International Association for K-12 Online Learning, but the type of program and method of implementation has an effect on its success.
Houghton Mifflin Harcourt has partnered with Trunity to make three digital curricula available online and off through the Trunity e-Learning Platform.
The Poudre School District Global Academy in Fort Collins, CO, has gone public with its use of online curricula for hybrid learning.
The 12-page "District Guide to Blended Learning Measurement" from The Learning Accelerator is intended to help schools judge the "effective use" of technology to achieve personalized learning and a competency-based progression of student learning.
Educators share their best practices for tech-enabled pedagogy, from building capacity to implementing lessons to supporting teachers and students.
A new partnership between the Pennsylvania Cyber Charter School and the Community College of Beaver County allows high school students to experience college-level courses and earn college credits.
The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Exploiting multiplying devices and login-fatigued employees has become a valuable currency for threat actors, so organizations need a strong access management solution in place to ensure that only trusted users and devices have access to their networks, applications, and data.