A parent whose children's school is using computing technology sent us a letter asking some ostensibly simple questions about the value of educational technology. But, while providing answers to those questions is actually not simple, we must, as a community, work to provide clear, readily accessible answers.
Devices that were once considered distractions from learning are finding their way into more and more classrooms.
In our new blog series, we relate our personal experiences — our learnings — in working with a Singaporean school – Nan Chiau Primary School — over the last six years. Here is our first installment!
We’re kicking off the academic year by honoring an innovative district and rolling out our redesigned website.
The Great K-12 iPad Buying Spree is underway. Here are a few doable/actionable suggestions to help your teachers get the most of that large expenditure !
The iPad came out of the Apple chute in 2010 like gangbusters, setting all kinds of sales records. Schools picked up on the iPad too. But the tablet is a fad, we argue; it will pass away in short order (two to three years) because it is neither a mobile device nor a work device – and folks (and schools, we should hope) want those two types of devices!
A recent study reveals that most students understand the need for testing and prefer to do it on a computer — but their parents still have issues.
The next (massive) wave of iPad buying by K-12 schools is underway. How those purchases can lead to success for students is the theme of this week’s blog!
The Common Core State Standards is taking a bashing. There was such positive momentum at the outset and now? While there are, of course, legitimate concerns about a range of implementation issues, what we see is a small, but very vocal and very –well organized, politically, leading the charge against CCSS. It’s time for the silent majority to stop being so silent!
Lynell Burmark, education consultant and speaker, explains how video editing software on mobile devices can bring learning to life for students.
Zero Trust acknowledges there is no longer a traditional network perimeter to be defended, because applications now exist in the cloud and users can log into the network from any location.