Innovating in education, especially with technology, doesn't come without its hurdles. These may be organizational; they may involve people not knowing what to do or having a lack of resources, but the result is a slow-down in the adoption of innovation.
Five school technology leaders answer our questions on learning with tech, sustainable 1-to-1, ESSA, student data privacy concerns and what they'd give up in their jobs if only they could.
In late December, families in the San Diego Unified School District were notified of a data breach launched through successful phishing emails. The number of affected people totaled more than 500,000, according to the district.
A new report finds fewer than 10 percent of school districts report that all students have access to non-shared devices at home, while the number of schools offering broadband at school continues to rise.
All tracking technologies have privacy implications. Whether those implications would be problematic for your school system often depends on what third parties are used to perform those functions, how they are configured and if the user is an adult or a student.
An Illinois school district has tapped into "big data" analytics through a subscription model to help improve student outcomes. Meridian School District #223 is working with Qlik Analytics from the Copley Consulting Group.
For our fourth-annual Readers’ Choice Awards, more than 1,000 education technology professionals weighed in on their favorite technologies, from instructional technology to security and privacy tools, from mobile devices to projectors, from games to multimedia authoring tools.
IT analyst firm Gartner has named its top 10 trends for 2019, and the "immersive user experience" is on the list, alongside blockchain, quantum computing and seven other drivers influencing how we interact with the world. The annual trend list covers breakout tech with broad impact and tech that could reach a tipping point in the near future.
The most common form of phishing email in education tends to include an attached invoice; 66 percent of hacker attempts use the attached invoice ploy to get unwary recipients to click on an infected link; another 28 percent use a payment notification scheme; and 6 percent try online order tricks.
Amazon Web Services has put its Storage Gateway — for connecting on-premises applications to AWS storage services — into a hardware appliance.