Building a BYOD Strategy For Education
|
|
- Shona Morrison
- 7 years ago
- Views:
Transcription
1 A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012
2 Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of the hottest IT topics in education and business in CBTS learned after a great deal of research and surveys, that there are few experts in this field because the concept is still in its early stages. The educators who have been involved are adamant in their opinions either for or against it. Arguments both for and against have merits. In reality, administrators, faculty and students are already using multiple devices today, including mobile devices, for all types of communications and learning both inside and outside the classroom. The users are comfortable with the devices they own and have learned how to use them effectively for their purposes. Mobile devices in particular are used many times each day for research, communication, and other knowledge-based functions by students and faculty alike. In light of these facts, we believe that the first point to consider in the process of implementing a BYOD strategy is establishing the underlying goal for introducing and supporting a BYOD policy. Defining and communicating that goal is paramount to ensuring that all parties affected, understand why BYOD is being implemented, as well as the expectations of the parameters around that implementation. William Stites, Director of Technology for Montclair Kimberley Academy in New Jersey, makes a salient point about what should drive BYOD. First and foremost, any program should meet your learning goals and your mission, and match your school s culture. Our focus would be on the learning process and how we would support that through training, professional development and teaching. In other words it is not about the device, but what is being taught and learned using the device. The goal is to understand that each device is simply one of many different options for communicating and some will offer more robust learning opportunities than others. The key is to try to maximize the overall message first, and then understand the multitude of ways for students to receive that message. This is the approach that successful schools have adopted to implement BYOD. As opposed to focusing on how to monitor and control each device on the school s network, they focus on the educational message and the delivery of that message, and ensure that the focus is in unison with the district s vision and goals. The Speak up 2012 National Survey clearly shows that more students are ready for active online learning and web access for multiple devices than most districts. Most students understand their devices and mobile technology extremely well. When the time comes to add students to a BYOD program, they should be involved at the inception of the decision making process to give their buy-in and ideas. Surveys show this will have a considerable impact on the success of the program and allow the planners to understand the possibilities, as well as the limitations from the students viewpoint. Each school is different and each BYOD program that has been successful mirrors the school s culture as much as possible. The schools that focus on finding the best method for delivering their curriculum, followed by making sure the faculty understand the goals and challenges, and then offering professional development, are the ones that champion the BYOD program. Page 2
3 The Critical Components Page 3 1. Network A district s network needs to be a certain standard that is consistent in every building that participates in the BYOD program. That network must be able to handle the existing traffic, have redundancy and scalability for future growth, and allow access of approved personal devices. In addition, there must be enough access points throughout the participating schools. 2. Security This is critical because of the need to protect critical information, yet allow access to network, applications, and services. Options include creating or expanding a separate guest network for BYOD, where personal information cannot be accessed or utilizing a virtual desktop solution. In general, all devices will not be able to access or display the same material in the same way because the goals of faculty and staff are different from the students. There will always be a question of how much access is allowed vs. how much security. Those are decisions that should be addressed prior to any implementation. 3. Defining and Setting a Policy The district will have to develop a clear and identifiable policy for user-owned devices that protects the district and students. It should clearly state any changes of existing practices, as well as the policies for both faculty and students. 4. Ensuring Proper Training To ensure success, it is critical for all stake holders to understand the program, the policies, and the devices to be used. This is best accomplished through proper training on how to maximize the learning opportunities through those devices. It is important for the IT staff to understand and handle the increase in questions about the network and access for the BYOD devices. 5. Some Cost Shifting from the School District to Users There is still a cost involved, but with BYOD, the cost may shift from the school district to the users or in some cases, the parents. Also, depending on the location of the district, there could be a wide gap of adoption between those with high-end devices and those who have none. This should be considered when determining how the curriculum and assignments can be received. 6. Creating a Culture of Acceptance and Change District personnel at all levels must embrace the changes brought on by new technologies. Students in many cases are already more tech-savvy than their teachers and parents. Understanding the changes and how to take advantage of the BYOD program effectively will help close the generation gap and improve learning opportunities. Paradigm shift is never easy or simple. Proper time to study, evaluate and understand the benefits and risks is critical to the ultimate success of BYOD in schools.
4 The BYOD Benefits 1. Access to Network and District Information Anywhere, Anytime With mobile communication devices, some faculty and many students are already at the forefront of the technology curve. Giving them the ability to utilize their devices for teaching, research, learning, sharing, and communicating, will better prepare students for the world of college and work. 2. District Costs Could be Reduced Utilizing faculty and student owned devices could help reduce the IT equipment, maintenance, and refresh cost for school districts. From a mobile standpoint, BYOD would mean that the district would focus more on software, security, applications, and delivery, as opposed to maintaining and continuously refreshing different types of devices. 3. Guest Network Could be Fully Utilized Schools with an existing guest network in place could utilize and expand that network to include at least some of the applications and programs that teachers and eventually students would be able to utilize for BYOD. The guest network should remain separate from the main network. This will protect the critical information and reduce potential security issues, while improving access and accelerating adoption. 4. A New Way of Teaching and Learning Teachers that understand how to utilize the web for learning give themselves another tool to reach those students that may not do as well in a classroom or structured environment. Teachers can offer lessons and projects that utilize the Internet for research, sharing, storing documents and innovative ideas. This empowers the teachers and students who take the initiative and creativity to new levels. Students can also benefit from using tools they understand and use every day to schedule activities and communicate. 5. A New Way to Collaborate BYOD breaks the boundary of learning, giving teachers and students unlimited resources on the Internet and the ability to communicate in many different ways. It also creates opportunities for teachers and students to collaborate at a time and place they are most comfortable with. Page 4
5 Recommendations The requirements for implementing a successful BYOD program are varied, but each one is critical. Districts must ensure that the infrastructure is in place to handle the increase in traffic and that security is tight enough to protect confidential information. A policy must be developed that enhances learning, but in an environment where the district can maintain control over the program. Our recommendation is to phase the program in so that best practices can be repeated and documented, and challenges would be reduced or eliminated prior to a district-wide rollout. Training and allowing faculty and staff to experience the BYOD project first, would help them understand the value, opportunities and limitations. Before moving toward a more extensive implementation that would include students, the district should closely study and evaluate the impact, both positive and negative, and assess the feasibility, usefulness, benefits and challenges of implementing the BYOD program. We are recommending that the following steps be taken to ensure the best chance of success. 1. Network Three components related to the network are critical for a successful implementation - bandwidth, redundancy and scalability. A successful program will allow bandwidth to increase incrementally as the program ramps up from school to school. For schools involved in a BYOD program, the greatest demand for that bandwidth during school hours will likely come from video. Also, once the program expands to multiple schools, the likelihood of the network being adversely affected increases. Quality and consistency of the network is important, as well as ensuring that critical communication is available and maintained at all times. Evaluating the network to ensure it has the capacity to grow is critical. Districts must invest in upgrading the network if needed to make sure it can handle the future demand for capacity. 2. Network Management Successfully managing and maintaining a growing network comes from planning and ensuring everything meets or exceeds the expected demand. This could mean an upgrade or new tools and training for the IT staff. In the planning stages, allow the staff to try different devices and tools so that issues can be identified and solved prior to rolling it district-wide. There are a growing number of tools on the market that assist with network management. Some now provide 100% management of switches, routers, and other devices, as well as wireless management and the ability to power up and down based on expected utilization. This could also reduce costs since utilization would be reduced during weekends and long breaks. 3. Security The key question is one of balance between protecting the confidential information and privacy of the users, and ensuring network access for user-owned devices. Federal regulations Page 5
6 governing content filtering and firewalls are clear and have to be implemented by K-12 administrators in public schools. A primary focus of a district s Internet services could involve personal information security. Security components, such as firewalls and ID codes, ensure that improper content and context are not transmitted and that the information security and access policies of the district are enforced. All users would need to authenticate when they access the Internet. It will take time to set up and even more time to administer access from every student that signs up. The network can support a pilot easily, but if the BYOD program is rolled out for the entire district, there must be assurance that the number of devices that need Internet access is anticipated prior to implementation or that there will be some limitations to the devices allowed on the network. Once users are registered, new software can manage and monitor access and usage. Districts should consider a strong security model / policy to offer an elevated level of protection. A policy server is an excellent option because it not only authenticates, but also authorizes user access at the access layer for wired and wireless. 4. School-Owned Devices Almost every school provides some type of compute device for students to use on the campus and some allow students to take the device home. If BYOD is implemented, consideration will be needed to ensure that all students will have some type of access to the information, regardless of device ownership or where the device is located. Broadband access or some type of Wi-Fi should be available at home or a public safe area such as a library. Teachers or students could utilize Wi-Fi and VPN into the school network to access school resources, with the proper credentials and authorization. This should be possible with the firewalls and client / clientless VPN capabilities offered by that device. 5. Student-Owned Devices A decision must be made on what type of delivery system to pursue that allows broadcasting of the curriculum for mobile use. The delivery will very likely change, depending on the device and not all devices will be able to access the content in the same way. Prior to allowing students access to the network, districts should send out a survey to understand how many students have their own devices and the type of devices they use. The type and level of learning is another salient factor that will impact the decision of which devices should be allowed to access the school network. A successful BYOD plan doesn't necessarily have to support any or all devices. Very few businesses and institutions have the network, bandwidth and IT staff that can support all devices; so a decision will have to be reached on which ones to allow and support. Gartner states as it relates to BYOD In the short term to midterm, there will be more platforms to support; and probably in the longer term, a shift from supporting devices to supporting applications and data as technologies, such as HTML5, allows more device independence." NOTE - There is no limiting G3 or G4, other than through policy. Many of these devices will have Wi-Fi regardless and students will choose that over 3G/4G. Therefore, it should be encouraged Page 6
7 to utilize these devices by limiting them with wireless policy access, role-based access and Internet filtering. Policies should address this issue. 6. User Policies Review your network access, acceptable use and conduct policies as they apply to students and employees to determine if an update is needed to reflect the new issues involved in BYOD and mobile learning. It is important to clearly define upfront, the type and amount of support the end users can get from the IT staff, as well as the type of applications and services the district will be offering. This will set the parameters for the entire program right from the start. Most districts offer limited support for mobile devices, thus leaving it up to students and the manufacturers to solve connection and bandwidth use issues with mobile devices. Districts should deploy role-based access on wireless and wired networks, then deploy sponsored guest access, and continue to filter Internet traffic. 7. Knowledgeable IT Staff The IT staff must be prepared for the changes, questions and resulting challenges and risks surrounding BYOD. The schools that were researched offered different methods, tools and ideas for communicating their lessons to the students. It s important to allow teachers to utilize their strengths and the technology to reach as many students as possible through various learning styles and devices. This will be limited by the equipment and technology the IT staff can support. 8. Mobile Device Management (MDM) CBTS would recommend MDM at some point in the move toward BYOD. MDM will help the district manage the devices on the network. Without some type of management tool, this is extremely labor intensive. An MDM tool will allow the IT staff to properly support and track the devices on the network, if that is the goal. Gartner states that many organizations are electing to implement a mobile device management product to facilitate enrolling devices into the plan, to ensure that policy settings are pushed onto the device, to provide compliance reporting, to monitor usage/policy compliance, and to put configuration parameters onto the device for access to networks and Mobile Application Management (MAM) Another management tool that would assist districts is a solution that focuses more on controlling and managing the apps made available on the network, known in the industry as Mobile Application Management (MAM). MAM describes software and services that accelerate and simplify the creation of internally-developed or in-house mobile applications. It also describes the deployment and management of in-house and commercially available mobile apps used on both organization-provided and bring your own smart phones and tablet computers. When an employee/student brings a personal device into a business or school setting, MAM enables the IT staff to provision the device, download appropriate applications, control access to back-end data, and wipe the device if it is lost, or when its owner no longer works with the organization. Page 7
We are XMA in Education.
We are XMA in Education. Call 0115 846 4900 Visit www.xma.co.uk/alllearn Email alllearn@xma.co.uk Follow us @WeareXMA We are XMA. We are XMA in Education We deliver innovative IT solutions that enhance
More informationGetting Started with BYOD
Getting Started with BYOD If we teach today as we taught yesterday, we rob our children of tomorrow. - John Dewey Today s education system is evolving to take full advantage of the potential of mobile
More informationHow Technology Executives are Managing the Shift to BYOD
A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationHCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines
HCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines Introduction: HCISD recognizes that our information-based world is becoming increasingly complex and students who are
More informationHoneoye Smart Schools Investment Plan (SSIP) Overview Final Plan
Honeoye Smart Schools Investment Plan (SSIP) Overview Final Plan What is the estimate of the total number of students and staff that will benefit from this Smart Schools Investment Plan based on the cumulative
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationhttp://www.velocis.in Extending Collaboration to BYOD Devices
Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More informationRutherford County Schools Bring Your Own Device
Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration
More informationNHTI Concord s Community College. Technology Strategic Directions FY2016 FY2019
NHTI Concord s Community College Technology Strategic Directions FY2016 FY2019 CONTEXT The college has adopted its Strategic Directions: Goals and Objective for 2016 to 2019, dated October 2015, that serves
More informationBYOD Networks for Kommuner
BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World
More informationThe New Enterprise Mobile Middleware. Mobile Backend-as-a-Service: The Agile Development Path for Mobile Apps
The New Enterprise Mobile Middleware Mobile Backend-as-a-Service: The Agile Development Path for Mobile Apps INTRODUCTION Mobile development in the enterprise is far from an easy endeavor. Development
More informationMeru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION
Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION WLAN Solutions for Higher Education Many campus networks are being crushed by the bring your own device (BYOD)
More informationBYOD Frequently asked questions and answers What is BYOD? BYOD stands for Bring Your Own Device and involves students bringing their own portable internet connected digital devices (smart phones, tablets,
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More informationManaged WiFi. Choosing the Right Managed WiFi Solution for your Organization. www.megapath.com. Get Started Now: 877.611.6342 to learn more.
Managed WiFi Choosing the Right Managed WiFi Solution for your Organization Get Started Now: 877.611.6342 to learn more. www.megapath.com Everyone is going Wireless Today, it seems that everywhere you
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationClare Middle School. Which should I bring? PLAN
Clare Middle School BYOD Wish you could take notes on your lap top? Need your ipad to help you research? Why can t you use your calculator app on your cell phone in math? Starting September 4, 2012, Clare
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationWhat Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
More informationBYOD Adaption in Banking
BYOD Adaption in Banking A report submitted to the Institute for Development and Reasearch in Banking Technology, Hyderabad In partial fulfillment of the summer internship of Bachelor of Technology In
More informationBudget Sub allocations by category that you are submitting for approval at this time.
Bloomfield Smart Schools Investment Plan (SSIP) Overview What is the estimate of the total number of students and staff that will benefit from this Smart Schools Investment Plan based on the cumulative
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationBYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
More informationBuilding Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationPennsylvania Department of Education
Pennsylvania Department of Education Commonwealth of Pennsylvania Department of Education 333 Market Street Harrisburg, PA 17126-0333 Educational Technology Report Thursday, April 28, 2011 (Last Approved:
More informationBYOD Enabling Technologies
BYOD Enabling Technologies Bryan Padgett 1 Our Vision for BYOD AGILEX PROPRIETARY 2 The BYOD Challenge Platform Diversity U.S. Smartphone Platform Market Share, December 2014 Source: comscore MobiLens
More informationCentralize it Secure it Simplify IT!
Centralize it Secure it Simplify IT! Dedicated to helping network administrators and IT executives securely manage remote connections, network accesses, passwords and credentials. Remote Desktop Manager
More informationMobile Device Management
Mobile Device Management The objective of this document is to provide you with context about mobile device management, for both ipad and Mac, to enable you to have a relevant conversation with your customer
More informationTechnological Requirements of the TEACH Act
Introduction Technological Requirements of the TEACH Act The President signed the Technology, Education and Copyright Harmonization Act (TEACH) on November 2, 2002. TEACH amends the copyright law by expanding
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More informationApplications the centerpiece of a BYOD environment.
Applications the centerpiece of a BYOD environment. November 2012 Summary Most businesses today realize that it has become a necessity to offer solutions to help employees better manage both their business
More informationLincoln Public Schools 2015 2018 Technology Plan. Vision for Technology Integration
Lincoln Public Schools 2015 2018 Technology Plan The introduction of Chromebooks for staff for the 2015-2016 school year will be a game changer for teaching and learning. This cost effective solution will
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationSMART Software for Mobile Devices Sales brief
SMART Software for Mobile Devices Sales brief For reseller use only This brief provides a summary of the information and tools available to assist in you in your conversations with education customers
More informationBEYOND LIMITATIONS CONNECTING POSSIBILITIES
BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in
More informationHP ProCurve Networking certification for resellers. Place yourself above the competition
HP ProCurve Networking certification for resellers Place yourself above the competition HP ProCurve Certified Professional program tracks Highest certification HP ProCurve Program Sales certifications
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationWLAN solutions to manage 1:1 and BYOD in K-12
MERU EDUCATION-GRADE SOLUTIONS FOR UNINTERRUPTED LEARNING SOLUTION BRIEF K-12 WLAN solutions to manage 1:1 and BYOD in K-12 BYOD Solutions for K-12/primary schools 1:1 computing where students are provided
More informationEastern Illinois University information technology services. strategic plan. January,
Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic
More informationKEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE
KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things
More informationEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
More informationTaking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationHow To Make Your School Successful Online
informed. Planning Considerations for K-12 Communications Technology frontier.com/enterprise 1 Executive Summary K-12 schools are increasingly wanting to leverage new digital learning technologies to make
More informationNANUET UFSD Instructional Technology Plan - Annually - 2015
LEA Information A. LEA Information 1. What is the total student enrollment based on the most recent BEDS Day submission? 2. 2,209 What is the student enrollment by grade band based on the latest BEDS Day
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationBring Your Own Device (BYOD) for Staff and Visitors
Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source
More informationThe Current Landscape
SMALLER SCALE HAS MORE SPACING INSIDE LOGOMARK LARGE SCALE HAS LESS SPACING INSIDE LOGOMARK MOBILE APPLICATIONS MANAGEMENT December 2013 Prepared by Clarity Innovations Contributors: Steve Burt, Marie
More informationNetwork Essentials for Superintendents
Network Essentials for Superintendents Upgrade your network for digital learning UNDERSTAND. How can I improve my network? As a district leader, you can help most in the planning and implementation of
More informationENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY
ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY Presenter October, 2014 MOBILITY AND THE APPLICATION INVASION 1.2 Billion SMART PHONES TO BE SHIPPED IN 2014 IDC Mobility is #1 PRIORITY
More informationCHAPTER 6 NETWORK DESIGN
CHAPTER 6 NETWORK DESIGN Chapter Summary This chapter starts the next section of the book, which focuses on how we design networks. We usually design networks in six network architecture components: Local
More informationBring Your Own Device (BYOD) Launches September 2015 Students in Grades 9-12. The How of BYOD
Bring Your Own Device (BYOD) Launches September 2015 Students in Grades 9-12 The How of BYOD How is the school preparing for a successful launch of a BYOD for students in Grades 9 12? This document covers
More informationNEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS
NEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS Unlocking the infinite possibilities of communications SUMMARY The city of Taguig, known for its openness to technological innovations, has recently implemented
More informationDell Connected Learning for Schools. Transforming Education for the Digital Age
Dell Connected Learning for Schools Transforming Education for the Digital Age This document was created to provide Dell s point of view for primary and secondary schools and contains the following sections:
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationReadying Your Campus for Mobile Learning and BYOD
Readying Your Campus for Mobile Learning and BYOD A Guide to Strategy and Planning Produced by For additional copies or to download this document, please visit: www.convergemag.com/mobilelearning 2012
More informationHow Nokia deployed AirWatch MDM for Nokia Lumia
How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned
More informationThe IT Managers Guide to selecting a cost-efficient platform for bedside Patient Entertainment
White Paper Patient Entertainment Solutions The IT Managers Guide to selecting a cost-efficient platform for bedside Patient Entertainment Why you need to consider the critical decision of Thin Client
More informationStrategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
More informationBYOD (Bring Your Own Device)
BYOD (Bring Your Own Device) Goal: As school districts budgets shrink and the need for technology resources increases, districts must find creative ways to bring technology into the schools. We are exploring
More information1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
More informationBYOD Strategy - Advantages and Disadvantages
BRING YOUR OWN DEVICE AN INTRODUCTION BYOD An Introduction 3 The Management Challenge and Opportunity 5 Adopting a Step by Step BYOD Strategy 8 BYOD It s Time 14 1NService Your BYOD Partner 15 Copyright
More informationBuilding a Comprehensive Mobile Security Strategy
WHITE PAPER Building a Comprehensive Mobile Security Strategy A key to safeguarding data and apps is finding the right partner. protecting mobile environments has become more complex. Fortunately, solutions
More informationa s t r at egy paper fr om Mobile Learning: Preparing for BYOD (Bring Your Own Device)
a s t r at egy paper fr om Mobile Learning: Preparing for BYOD (Bring Your Own Device) Mobile Learning: Preparing for BYOD (Bring Your Own Device) The BYOD Concept The days of students carrying heavy,
More informationTECHNOLOGY AND OUR STUDENTS. A Rationale and Proposal for Expansion
TECHNOLOGY AND OUR STUDENTS A Rationale and Proposal for Expansion Expanding the 1:1 program already in grades 5 8 to Mira Costa High School with a Bring Your Own Device Model June 5, 2013 BYOD AT MIRA
More informationThe Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
More informationDeploying Apple ios in Education
Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7
More informationJack West Lead Educator Hapara Team Twitter @hapara_team
Jack West Lead Educator Hapara Team Twitter @hapara_team goo.gl/pgieid Schools in 180 countries have gone Google Source: Google Marketing Source: statcounter.com 0.2% in 2012 9.6% in 2013 Why? Joel Handler
More informationFor Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION
For Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION Android Tablets in Education Tablet initiatives are revolutionising how schools meet and deliver their vision
More informationMobilize to Rightsize Your Network
Mobilize to Rightsize Your Network Table of Contents How enterprise mobility can reduce the total cost of network ownership by 70 percent 3 Mobility means cost savings 3 Getting started on savings 4 Make
More informationMobility Impact on the Enterprise
BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device
More informationCellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com
CellCast Solution for BlackBerry Smartphones Security Overview Revised: June 2010 www.mlearning.com Introduction The CellCast Solution for BlackBerry empowers sales, service and other remote teams to distribute
More informationBYOD & Virtualization: Managing Mobile
White Paper 01 Finches Only 02 ViewSonic Only BYOD & Virtualization: Managing Mobile Devices from the Desktop Erik Willey 04.15.2014 SUMMARY: Integrated with Citrix XenMobile, ViewSonic s SD-A245 smart
More informationTriad Local School District Bring Your Own Device Student Device User Agreement 7540.031F1
Triad School District BYOD Implementation Guide and Procedures Guide Contents: Introduction 1. Why BYOD at Triad? Page 2 2. What is BYOD? Page 3 3. Network/Infrastructure 4. FAQs 5. Parents Page 6 6. Students
More informationNew York State Education Department Instructional technology plan survey
The instructional technology plan survey is designed to allow districts the opportunity to compile all data related to their technology planning and needs in one location. The data collected in the survey
More informationty School District Digita al Classrooms Plan
Nassau Count ty School District Digita al Classrooms Plan Nassau County School Districtt Digital Classrooms Plan 1 P age The intent of the District Digital Classroom Plan (DCP) is to provide a perspective
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationProgram Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT is responsible for negotiating and licensing software available as a site- wide license as well as many volume- license purchases for specific College or divisional use. DoIT also
More informationIntelligent, Functional and Effective Gateways for Small Business Applications
Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime
More informationBring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
More informationLuminonCore Virtual Desktop Infrastructure (VDI) Products
LuminonCore Virtual Desktop Infrastructure (VDI) Products LuminonCore VDI products eliminate your doubts on current virtual desktop products from the market. LuminonCore VDI brings totally upgraded desktop
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationBYOD Strategy (Service Mobility) 2014
Information Resources BYOD Strategy (Service Mobility) 2014 BYOD Strategy Group Joseph Casabona Lee DeAngelis Adam Edwards Diane Kennedy Calvin Krzywiec (Chair) Timothy Meade Glen Pace Jason Wimmer 1 Summary
More information***NOTICE***: Proposed Selection Date now 12/16/13
Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out
More informationAn Intelligent Solution for the Mobile Enterprise
An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of
More informationThe 9 Pillars of Enterprise Mobility
The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationAC 2012-3701: LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID. Dr. Se Jun Song, Texas A&M University, College Station
AC 2012-3701: LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID Dr. Se Jun Song, Texas A&M University, College Station c American Society for Engineering Education, 2012 Lessons
More informationTechnology Department Infrastructure & Support
Technology Department Infrastructure & Support The Technology Department Team Executive Director of Technology Technology Coordinator Network Engineer Application Administrator Application Specialist Infrastructure
More informationCompliance Ready Mobile Device Management (MDM)
Presenting Network Security Solutions: Compliance Ready Mobile Device Management (MDM) Presenters: Your Name iboss Network Security Your Title Background on iboss Network Security Over Nine Years of Engineering:
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationMeraki 2015 Solution Brochure
Meraki 2015 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
More informationFY15 UW-Parkside Institutional IT Plan Report
FY15 UW-Parkside Institutional IT Plan Report A. Information Technology & University Strategic Objectives [1-2 pages] 1. How was the plan developed? The plan is a compilation of input received from a wide
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More information