By Sue Glascoe, Contributor
By Sue Glascoe, Contributor
Education for today’s learners
Source: “Prepare your WLAN for the BYOD Invasion,” Aberdeen Group
In today’s educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the campus network. This presents a unique challenge to the IT administrator. This paper discusses the challenges and solutions IT administrators are facing and how HP is addressing the security and management of the multiple devices being introduced into the wireless/wired network.
Technology is an essential element to keeping today’s students engaged. Demand for the expanded use of technology in education to raise academic achievement comes from virtually all constituents, from the federal government, to state education departments, to local school boards, teachers, parents, and students themselves.
Tablets, notebooks, and other mobile devices takes learning out from computer labs and libraries and puts it directly into student’s hands. Especially for students who have grown up with Internet, gaming consoles, and texting. Digital curricula allow teachers to create new levels of interactivity that are ideal for individual and team learning, developing science and math skills, and language immersion. Mobile devices open up a universe of possibilities for science labs, distance learning, and student presentations. Teachers have new ways to assess students’ individual progress and provide additional instruction to students before they fall significantly behind.
To view the entire White Paper, download the document below.
August 13, 2012, 8:00 am
The academic year is about to begin (or perhaps has already begun, at least where faculty meetings are concerned). Many of us will, no doubt, be taking advantage of a number of online services for sharing documents, organizing our course materials, buying books both analog and digital, synchronizing documents between our home and work computers, communicating with students and colleagues, storing and streaming media, etc. We’ve certainly covered the range of such services here: Dropbox, Spideroak, Google Documents/Drive, Google Plus, etc.
These services are incredibly convenient. Convenience, however, can have a downside: convenient services aren’t always as secure as we might like them to be (as Dave Parry pointed out last year, in a post that’s still very much worth reading for the questions about security and privacy that it raises). Services that make our data so very conveniently available to us on multiple devices may have security holes—and any service that can help us recover our password can also access our data. (That works both ways, of course. A service that can’t help us reset our password can’t access our data, but if we forget the password, we’ve got a serious problem if the data’s important.)
The most recent high-profile case illustrating the potential for trouble with the online services we find so convenient and useful is what happened to Mat Honan on August 3.
One of the things the Honan story makes clear is that users aren’t the only link in the security chain. There were security problems at both Amazon and Apple that, used in tandem, allowed hackers to get into his accounts. Using strong passwords (and different passwords for each site/service!) is essential, but it wouldn’t have helped in this particular instance. The primary security problems were with the services themselves.
Fortunately, Amazon and Apple have already made some changes in the way they handle things, as Mr. Honan told Renee Montagne on August 9.
There are also a number of things that users can do to reduce their likelihood of being hacked in a similar way. Both LifeHacker and Gizmodo provide a list of such measures, and those lists are well worth reading carefully.
It’s also really important, though, to think carefully about why and how we’re using such services to begin with. A non-exhaustive list of questions to ask ourselves about the data we work with every day might include the following:
Sorting through these types of questions can help us figure out what kinds of services (if any) to use for storing data online. It may well be that we’ll end up using a variety of services for different purposes, taking care to keep each as secure as possible. (For example: I use Dropbox for storing journal articles I want to read, since I have a lot of storage space there and it integrates very well with such tools as iAnnotate. Items that I need or want to be more secure live in Spideroak—I have less space there, but I don’t have that many things that really need more security than simple password protection. I keep all kinds of working documents in Google Drive, bt nothing that absolutely must remain wholly private.)
What about you? What services do you use for what purposes? Why those services rather than others? What steps do you take to keep your data as secure as possible? Let us know in the comments.
Are you anchored down by your PowerPoint presentations, but you don’t know how to untangle yourself from their grip? Be a Canvas power user and develop effective online lectures using tools in Canvas. View the session below from Instructure 2012, presented by Rebekah Grow of University of Utah where she talks about integrating tools in Canvas to create online lectures in combination with using a Cognitive Theory of Multimedia Learning: Implications for Design Principals (Meyer and Moreno) as a guideline for measuring its effectiveness.