Creating "gold-standard" project-based learning requires effective training (and more training), staying light on your feet and getting top leader commitment.
A Silicon Valley library’s quest to ignite innovation.
This middle school teacher has found ways to leave the old essay model behind and still help her students learn what they need to know.
Total immersion may be possible virtually, but it is not feasible in a school. Even if it were, it could not address some important educational principles as well as an actual physical environment. For example, school is a place for in-person student/student, student/educator and educator/educator collaborations that are essential to differentiated learning strategies.
With the focus on providing better services to students and teachers, the applications for Internet of Things is projected to grow exponentially in the K-12 setting, but questions are becoming increasingly apparent on how to protect school data under controlled conditions.
Managing communications can be a big job, but through a combination of outsourcing and sharing responsibility internally, districts can be ready for even the deepest crises.
Redrawing boundaries has more hurdles than a track meet and all the emotional charge that often comes with parents wanting the best for their children. A CIO shares how his district got a leg up on both.
Here’s how schools are overcoming some of the biggest hurdles to effective project-based learning.
Here’s how one school district made sure that our $18 million digital classroom refresh project produced high adoption levels while supporting instruction.
3D printing is a technology that can be as complex or as simple as you make it. These ins and outs can help you simplify how 3D printing works in the classroom.
The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Exploiting multiplying devices and login-fatigued employees has become a valuable currency for threat actors, so organizations need a strong access management solution in place to ensure that only trusted users and devices have access to their networks, applications, and data.