Whitepapers

Welcome to our free K-12-technology-in-the-classroom white paper and case study library from our sponsors. Click a title to read more or download. If you have any questions or comments about our white papers please contact Mallory Bundy via email.


Understanding the Role of Stolen Credentials in Data Breaches

Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.


Display Size Matters: Selecting the Right Display Size for Classrooms

Imaging technology has dramatically affected the experience of K-12 teaching and classroom dynamics. From a time when the primary ways to relay information were verbal, via a blackboard or overhead projector, to the current array of computers, tablets, flat screens and projectors – deciding what to select can be complicated. Today there is a lot of focus on flat panels and projectors. However the big dilemma isn’t which technology to select, but how to support the right visual environments that help teachers teach and students learn. Whether the pedagogical style is sage on a stage, guide by the side, flipped classrooms, display-based or constructivist, getting everyone on the same page and keeping focus are key components in supporting student comprehension.


Get a Handle on Network Security

With the pressing need to provide high-speed, secure, shared networks across school districts, network security continues to be a critical issue for educators. Shared computers in labs and other common areas are available to all students and students regularly connect with myriad devices under BYOD policies. These situations keep network administrators up at night. With so many concentrated users expecting easy, anywhere access to the network, security continues to be an increasing challenge. Download this exclusive Tech Tactics to learn why many school districts have moved to a virtual desktop infrastructure (VDI) to address these pressing issues.


The Case for Logon Management in Education

Whether it’s a student trying their hand at hacking or leveraging a stolen teacher’s password, a teacher up to no good, or an external attacker leveraging stolen passwords, how are you supposed to spot inappropriate access?


Accelerate Professional Learning

Download this informative white paper to explore how two districts help their educators create the collaborative, creative, and student-centered environment every student deserves. Two districts profiled here—one a pioneer in the use of 1-to-1 devices in the classroom and the other much newer to the pervasive use of educational technology—share their lessons for building a culture of change that’s both sustainable and scalable through regular professional learning sessions.


Choosing the Best Student Technology for Transformative Learning

When you design a modern learning environment you need to make the right technology choices to support your learning model. Read this paper from Dell and Intel® for ideas to help shape your thinking about which students’ technology tools will enhance the learning experience.


Build the 21st Century Classroom Infrastructure

There is a revolution underway in K-12 classrooms as school districts and boards move to adopt a new style of classrooms and pedagogy focused on mobile learning. In order to succeed, the move to anywhere, anytime learning must be supported by a strong foundation in technology, particularly network infrastructure. Download this informative GameChanger to learn how school districts are supporting modern education practices.


7 Keys to Success for 1-1 Computing Program

Louis Zulli Jr., technology coordinator, IT instructor and network administrator for The Center for Advanced Technologies (CAT), has led a technological transformation beginning over two years ago that has resulted in a highly regarded magnet program—ranked as one of the top five STEM programs in the country by the University of Connecticut—that makes heavy use of current technologies like Dell tablets and computers running Microsoft Windows 10.