CUE is an ed tech association on the move. Known nationally for its annual conference in Palm Springs (coming up March 14–17), which typically attracts 5,000 to 7,000 attendees — a massive figure for a regional organization — CUE is ramping up its efforts in several areas in the coming year, including teacher professional development and advocacy of education issues like E-rate, net neutrality and student data privacy.
Montour Elementary School's latest makerspace, the first of its kind powered by Lego Education, wasn't the school's first advanced, hands-on learning lab, and it won't be its last.
A panel of top-level technology leaders from five school districts looks back on the role of the CTO in K–12 education and how it's transforming in the new year.
MIT education researcher Meredith Thompson shares three vignettes of three different approaches to virtual reality in K–12: a social studies class in a suburban school district, a district-wide perspective from an urban school district and a class designed entirely around understanding and implementing VR for other classrooms.
Seasoned educator Jeff Mao shares insights for teachers trying to adapt to a 1-to-1 environment and come to terms with the impact that has on teaching practices.
Is the internet destined to become just another wedge pushing the achievement gap wider?
The American architect Louis Sullivan coined the phrase "form follows function," and this is true of classrooms as well.
A record number of educators weighed in on their favorite technologies in our third-annual Readers' Choice Awards. And they were clear about who their favorites were.
Districts three to five years into their 1-to-1 programs share best practices and lessons they've learned the hard way.
Getting parents involved is key to students' success. Here's how to connect with families from all backgrounds.
The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Exploiting multiplying devices and login-fatigued employees has become a valuable currency for threat actors, so organizations need a strong access management solution in place to ensure that only trusted users and devices have access to their networks, applications, and data.