T.H.E. News Update :: April 22, 2009

News & Issues

  • More Changes in Store for the Traditional Textbook Model?

    Rumblings of change in the textbook and instructional materials world are growing louder with a bill pending in the Texas Legislature. HB 4294 would change the enormous system of textbook acquisition and distribution in Texas by allowing school districts to use the textbook fund to purchase technologies and by creating a new, less demanding way of vetting "electronic textbooks." If HB 4294 makes it through the legislative process, the potential for change across the country is enormous. More
  • Site Helps Schools Find Stimulus Funding

    Coverage of the stimulus package has been everywhere, from the most obscure blogs to the front page of the New York Times. And $110 billion of that money has been set aside for education. What seems to be missing from all the coverage, though, is exactly how to bring any of that money from the coffers in Washington into your school and classroom. More
  • Bluetooth 3.0 Speeds Transfers to 24 Mbps

    The Bluetooth SIG has formally adopted the Bluetooth Core Specification Version 3.0 High Speed, also known as Bluetooth 3.0. More
  • Fireware XTM To Extend UTM Appliance Security

    WatchGuard Technologies has introduced Fireware XTM, its new operating system for unified threat management (UTM) firewall appliances. The latest release includes a variety of security enhancements and improvements to networking and management and is expected to be available in early June. More
  • e2Campus Adopts OASIS Common Alerting Protocol 1.1

    Omnilert has released e2Campus 3.0, an update to the company's emergency notification system for education. The latest release adds support for OASIS Common Alerting Protocol (CAP) 1.1, allowing e2Campus to integrate with a range of other emergency communications systems. More
  • FFL Examines E-Rate Difficulties in Latest Survey

    Funding compliance services firm Funds for Learning has announced the launch of its second annual National E-rate Survey. The survey seeks to glean extensive feedback on the federal E-rate program, which helps schools fund educational technology purchases and upgrades. More
  • Horizon Intros Food Service Management System for Smaller Districts

    Horizon Software International has announced the release of KidServe, a complete food service management application aimed specifically at districts with between one and eight schools. The point of sale (POS) software manages all aspects of school food service, including inventory management, cost management, personnel, ordering, menus, and a diverse array of payment plan options. More

EduHound.com

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.