The biggest technology companies in the world are racing to position themselves as “mobile-first" because people are using mobile devices all the time, everywhere. Going mobile-first is in — except in K-12 education.
The latest, free app in the Co.llaboration Suite of collabrified apps, Co.Xplore supports students in learning with each other by sharing the photos they take on their mobile devices.
An award-winning teacher and author shares her secrets for transforming slide shows into interactive learning experiences.
With zillions of apps in Apple's App Store and the Google Play store, how could there be an educational app that is not there? As you will read in this week’s blog post, there is an app that needs to be built — an app that we built for the Palm Pilot and PocketPC 10 years ago — that needs to be resurrected now!
An instructional technologist says that mobile devices in the classroom should help students with creation, consumption, curation and connection.
Singapore’s Ministry of Education provides a clear answer to the question raised by a third-grade Singaporean science teacher: It’s no longer about preparing children for the Industrial Age. It's about preparing children for the Age of Knowledge Work. Okay, American education: Time to enter the 21st century!
As documented on the front page of the New York Times, teachers are being asked to make decisions about the data privacy and security aspects of the apps they bring into their classrooms. With the current district/school policies, it is only a matter of time before a parent will sue a teacher for allowing a child’s data to be published on the Internet. Something is wrong here!!
Our expert explains some basic privacy issues that district leaders need to understand.
In this post we first describe, based on research, what a productive (synchronous) collaborative interaction is, and then we identify the three benefits to the students from engaging in a productive collaborative interaction.
Connectivity is an absolute necessity, but it isn’t enough. The Internet is merely a river of information. In order to drink from it, each student needs his or her own cup.
Detect and remediate compromised accounts proactively and harden network defenses with Duo Trust Monitor, which delivers advanced anomaly detection by surfacing risky access events.