Building a BYOD Strategy For Education

Size: px
Start display at page:

Download "Building a BYOD Strategy For Education"

Transcription

1 A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012

2 Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of the hottest IT topics in education and business in CBTS learned after a great deal of research and surveys, that there are few experts in this field because the concept is still in its early stages. The educators who have been involved are adamant in their opinions either for or against it. Arguments both for and against have merits. In reality, administrators, faculty and students are already using multiple devices today, including mobile devices, for all types of communications and learning both inside and outside the classroom. The users are comfortable with the devices they own and have learned how to use them effectively for their purposes. Mobile devices in particular are used many times each day for research, communication, and other knowledge-based functions by students and faculty alike. In light of these facts, we believe that the first point to consider in the process of implementing a BYOD strategy is establishing the underlying goal for introducing and supporting a BYOD policy. Defining and communicating that goal is paramount to ensuring that all parties affected, understand why BYOD is being implemented, as well as the expectations of the parameters around that implementation. William Stites, Director of Technology for Montclair Kimberley Academy in New Jersey, makes a salient point about what should drive BYOD. First and foremost, any program should meet your learning goals and your mission, and match your school s culture. Our focus would be on the learning process and how we would support that through training, professional development and teaching. In other words it is not about the device, but what is being taught and learned using the device. The goal is to understand that each device is simply one of many different options for communicating and some will offer more robust learning opportunities than others. The key is to try to maximize the overall message first, and then understand the multitude of ways for students to receive that message. This is the approach that successful schools have adopted to implement BYOD. As opposed to focusing on how to monitor and control each device on the school s network, they focus on the educational message and the delivery of that message, and ensure that the focus is in unison with the district s vision and goals. The Speak up 2012 National Survey clearly shows that more students are ready for active online learning and web access for multiple devices than most districts. Most students understand their devices and mobile technology extremely well. When the time comes to add students to a BYOD program, they should be involved at the inception of the decision making process to give their buy-in and ideas. Surveys show this will have a considerable impact on the success of the program and allow the planners to understand the possibilities, as well as the limitations from the students viewpoint. Each school is different and each BYOD program that has been successful mirrors the school s culture as much as possible. The schools that focus on finding the best method for delivering their curriculum, followed by making sure the faculty understand the goals and challenges, and then offering professional development, are the ones that champion the BYOD program. Page 2

3 The Critical Components Page 3 1. Network A district s network needs to be a certain standard that is consistent in every building that participates in the BYOD program. That network must be able to handle the existing traffic, have redundancy and scalability for future growth, and allow access of approved personal devices. In addition, there must be enough access points throughout the participating schools. 2. Security This is critical because of the need to protect critical information, yet allow access to network, applications, and services. Options include creating or expanding a separate guest network for BYOD, where personal information cannot be accessed or utilizing a virtual desktop solution. In general, all devices will not be able to access or display the same material in the same way because the goals of faculty and staff are different from the students. There will always be a question of how much access is allowed vs. how much security. Those are decisions that should be addressed prior to any implementation. 3. Defining and Setting a Policy The district will have to develop a clear and identifiable policy for user-owned devices that protects the district and students. It should clearly state any changes of existing practices, as well as the policies for both faculty and students. 4. Ensuring Proper Training To ensure success, it is critical for all stake holders to understand the program, the policies, and the devices to be used. This is best accomplished through proper training on how to maximize the learning opportunities through those devices. It is important for the IT staff to understand and handle the increase in questions about the network and access for the BYOD devices. 5. Some Cost Shifting from the School District to Users There is still a cost involved, but with BYOD, the cost may shift from the school district to the users or in some cases, the parents. Also, depending on the location of the district, there could be a wide gap of adoption between those with high-end devices and those who have none. This should be considered when determining how the curriculum and assignments can be received. 6. Creating a Culture of Acceptance and Change District personnel at all levels must embrace the changes brought on by new technologies. Students in many cases are already more tech-savvy than their teachers and parents. Understanding the changes and how to take advantage of the BYOD program effectively will help close the generation gap and improve learning opportunities. Paradigm shift is never easy or simple. Proper time to study, evaluate and understand the benefits and risks is critical to the ultimate success of BYOD in schools.

4 The BYOD Benefits 1. Access to Network and District Information Anywhere, Anytime With mobile communication devices, some faculty and many students are already at the forefront of the technology curve. Giving them the ability to utilize their devices for teaching, research, learning, sharing, and communicating, will better prepare students for the world of college and work. 2. District Costs Could be Reduced Utilizing faculty and student owned devices could help reduce the IT equipment, maintenance, and refresh cost for school districts. From a mobile standpoint, BYOD would mean that the district would focus more on software, security, applications, and delivery, as opposed to maintaining and continuously refreshing different types of devices. 3. Guest Network Could be Fully Utilized Schools with an existing guest network in place could utilize and expand that network to include at least some of the applications and programs that teachers and eventually students would be able to utilize for BYOD. The guest network should remain separate from the main network. This will protect the critical information and reduce potential security issues, while improving access and accelerating adoption. 4. A New Way of Teaching and Learning Teachers that understand how to utilize the web for learning give themselves another tool to reach those students that may not do as well in a classroom or structured environment. Teachers can offer lessons and projects that utilize the Internet for research, sharing, storing documents and innovative ideas. This empowers the teachers and students who take the initiative and creativity to new levels. Students can also benefit from using tools they understand and use every day to schedule activities and communicate. 5. A New Way to Collaborate BYOD breaks the boundary of learning, giving teachers and students unlimited resources on the Internet and the ability to communicate in many different ways. It also creates opportunities for teachers and students to collaborate at a time and place they are most comfortable with. Page 4

5 Recommendations The requirements for implementing a successful BYOD program are varied, but each one is critical. Districts must ensure that the infrastructure is in place to handle the increase in traffic and that security is tight enough to protect confidential information. A policy must be developed that enhances learning, but in an environment where the district can maintain control over the program. Our recommendation is to phase the program in so that best practices can be repeated and documented, and challenges would be reduced or eliminated prior to a district-wide rollout. Training and allowing faculty and staff to experience the BYOD project first, would help them understand the value, opportunities and limitations. Before moving toward a more extensive implementation that would include students, the district should closely study and evaluate the impact, both positive and negative, and assess the feasibility, usefulness, benefits and challenges of implementing the BYOD program. We are recommending that the following steps be taken to ensure the best chance of success. 1. Network Three components related to the network are critical for a successful implementation - bandwidth, redundancy and scalability. A successful program will allow bandwidth to increase incrementally as the program ramps up from school to school. For schools involved in a BYOD program, the greatest demand for that bandwidth during school hours will likely come from video. Also, once the program expands to multiple schools, the likelihood of the network being adversely affected increases. Quality and consistency of the network is important, as well as ensuring that critical communication is available and maintained at all times. Evaluating the network to ensure it has the capacity to grow is critical. Districts must invest in upgrading the network if needed to make sure it can handle the future demand for capacity. 2. Network Management Successfully managing and maintaining a growing network comes from planning and ensuring everything meets or exceeds the expected demand. This could mean an upgrade or new tools and training for the IT staff. In the planning stages, allow the staff to try different devices and tools so that issues can be identified and solved prior to rolling it district-wide. There are a growing number of tools on the market that assist with network management. Some now provide 100% management of switches, routers, and other devices, as well as wireless management and the ability to power up and down based on expected utilization. This could also reduce costs since utilization would be reduced during weekends and long breaks. 3. Security The key question is one of balance between protecting the confidential information and privacy of the users, and ensuring network access for user-owned devices. Federal regulations Page 5

6 governing content filtering and firewalls are clear and have to be implemented by K-12 administrators in public schools. A primary focus of a district s Internet services could involve personal information security. Security components, such as firewalls and ID codes, ensure that improper content and context are not transmitted and that the information security and access policies of the district are enforced. All users would need to authenticate when they access the Internet. It will take time to set up and even more time to administer access from every student that signs up. The network can support a pilot easily, but if the BYOD program is rolled out for the entire district, there must be assurance that the number of devices that need Internet access is anticipated prior to implementation or that there will be some limitations to the devices allowed on the network. Once users are registered, new software can manage and monitor access and usage. Districts should consider a strong security model / policy to offer an elevated level of protection. A policy server is an excellent option because it not only authenticates, but also authorizes user access at the access layer for wired and wireless. 4. School-Owned Devices Almost every school provides some type of compute device for students to use on the campus and some allow students to take the device home. If BYOD is implemented, consideration will be needed to ensure that all students will have some type of access to the information, regardless of device ownership or where the device is located. Broadband access or some type of Wi-Fi should be available at home or a public safe area such as a library. Teachers or students could utilize Wi-Fi and VPN into the school network to access school resources, with the proper credentials and authorization. This should be possible with the firewalls and client / clientless VPN capabilities offered by that device. 5. Student-Owned Devices A decision must be made on what type of delivery system to pursue that allows broadcasting of the curriculum for mobile use. The delivery will very likely change, depending on the device and not all devices will be able to access the content in the same way. Prior to allowing students access to the network, districts should send out a survey to understand how many students have their own devices and the type of devices they use. The type and level of learning is another salient factor that will impact the decision of which devices should be allowed to access the school network. A successful BYOD plan doesn't necessarily have to support any or all devices. Very few businesses and institutions have the network, bandwidth and IT staff that can support all devices; so a decision will have to be reached on which ones to allow and support. Gartner states as it relates to BYOD In the short term to midterm, there will be more platforms to support; and probably in the longer term, a shift from supporting devices to supporting applications and data as technologies, such as HTML5, allows more device independence." NOTE - There is no limiting G3 or G4, other than through policy. Many of these devices will have Wi-Fi regardless and students will choose that over 3G/4G. Therefore, it should be encouraged Page 6

7 to utilize these devices by limiting them with wireless policy access, role-based access and Internet filtering. Policies should address this issue. 6. User Policies Review your network access, acceptable use and conduct policies as they apply to students and employees to determine if an update is needed to reflect the new issues involved in BYOD and mobile learning. It is important to clearly define upfront, the type and amount of support the end users can get from the IT staff, as well as the type of applications and services the district will be offering. This will set the parameters for the entire program right from the start. Most districts offer limited support for mobile devices, thus leaving it up to students and the manufacturers to solve connection and bandwidth use issues with mobile devices. Districts should deploy role-based access on wireless and wired networks, then deploy sponsored guest access, and continue to filter Internet traffic. 7. Knowledgeable IT Staff The IT staff must be prepared for the changes, questions and resulting challenges and risks surrounding BYOD. The schools that were researched offered different methods, tools and ideas for communicating their lessons to the students. It s important to allow teachers to utilize their strengths and the technology to reach as many students as possible through various learning styles and devices. This will be limited by the equipment and technology the IT staff can support. 8. Mobile Device Management (MDM) CBTS would recommend MDM at some point in the move toward BYOD. MDM will help the district manage the devices on the network. Without some type of management tool, this is extremely labor intensive. An MDM tool will allow the IT staff to properly support and track the devices on the network, if that is the goal. Gartner states that many organizations are electing to implement a mobile device management product to facilitate enrolling devices into the plan, to ensure that policy settings are pushed onto the device, to provide compliance reporting, to monitor usage/policy compliance, and to put configuration parameters onto the device for access to networks and Mobile Application Management (MAM) Another management tool that would assist districts is a solution that focuses more on controlling and managing the apps made available on the network, known in the industry as Mobile Application Management (MAM). MAM describes software and services that accelerate and simplify the creation of internally-developed or in-house mobile applications. It also describes the deployment and management of in-house and commercially available mobile apps used on both organization-provided and bring your own smart phones and tablet computers. When an employee/student brings a personal device into a business or school setting, MAM enables the IT staff to provision the device, download appropriate applications, control access to back-end data, and wipe the device if it is lost, or when its owner no longer works with the organization. Page 7

We are XMA in Education.

We are XMA in Education. We are XMA in Education. Call 0115 846 4900 Visit www.xma.co.uk/alllearn Email alllearn@xma.co.uk Follow us @WeareXMA We are XMA. We are XMA in Education We deliver innovative IT solutions that enhance

More information

Getting Started with BYOD

Getting Started with BYOD Getting Started with BYOD If we teach today as we taught yesterday, we rob our children of tomorrow. - John Dewey Today s education system is evolving to take full advantage of the potential of mobile

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

HCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines

HCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines HCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines Introduction: HCISD recognizes that our information-based world is becoming increasingly complex and students who are

More information

Honeoye Smart Schools Investment Plan (SSIP) Overview Final Plan

Honeoye Smart Schools Investment Plan (SSIP) Overview Final Plan Honeoye Smart Schools Investment Plan (SSIP) Overview Final Plan What is the estimate of the total number of students and staff that will benefit from this Smart Schools Investment Plan based on the cumulative

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

ios Education Deployment Overview

ios Education Deployment Overview ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay

More information

Rutherford County Schools Bring Your Own Device

Rutherford County Schools Bring Your Own Device Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration

More information

NHTI Concord s Community College. Technology Strategic Directions FY2016 FY2019

NHTI Concord s Community College. Technology Strategic Directions FY2016 FY2019 NHTI Concord s Community College Technology Strategic Directions FY2016 FY2019 CONTEXT The college has adopted its Strategic Directions: Goals and Objective for 2016 to 2019, dated October 2015, that serves

More information

BYOD Networks for Kommuner

BYOD Networks for Kommuner BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World

More information

The New Enterprise Mobile Middleware. Mobile Backend-as-a-Service: The Agile Development Path for Mobile Apps

The New Enterprise Mobile Middleware. Mobile Backend-as-a-Service: The Agile Development Path for Mobile Apps The New Enterprise Mobile Middleware Mobile Backend-as-a-Service: The Agile Development Path for Mobile Apps INTRODUCTION Mobile development in the enterprise is far from an easy endeavor. Development

More information

Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION

Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION WLAN Solutions for Higher Education Many campus networks are being crushed by the bring your own device (BYOD)

More information

BYOD Frequently asked questions and answers What is BYOD? BYOD stands for Bring Your Own Device and involves students bringing their own portable internet connected digital devices (smart phones, tablets,

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. www.megapath.com. Get Started Now: 877.611.6342 to learn more.

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. www.megapath.com. Get Started Now: 877.611.6342 to learn more. Managed WiFi Choosing the Right Managed WiFi Solution for your Organization Get Started Now: 877.611.6342 to learn more. www.megapath.com Everyone is going Wireless Today, it seems that everywhere you

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Clare Middle School. Which should I bring? PLAN

Clare Middle School. Which should I bring? PLAN Clare Middle School BYOD Wish you could take notes on your lap top? Need your ipad to help you research? Why can t you use your calculator app on your cell phone in math? Starting September 4, 2012, Clare

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

BYOD Adaption in Banking

BYOD Adaption in Banking BYOD Adaption in Banking A report submitted to the Institute for Development and Reasearch in Banking Technology, Hyderabad In partial fulfillment of the summer internship of Bachelor of Technology In

More information

Budget Sub allocations by category that you are submitting for approval at this time.

Budget Sub allocations by category that you are submitting for approval at this time. Bloomfield Smart Schools Investment Plan (SSIP) Overview What is the estimate of the total number of students and staff that will benefit from this Smart Schools Investment Plan based on the cumulative

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987 BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information

More information

Building Remote Access VPNs

Building Remote Access VPNs Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Pennsylvania Department of Education

Pennsylvania Department of Education Pennsylvania Department of Education Commonwealth of Pennsylvania Department of Education 333 Market Street Harrisburg, PA 17126-0333 Educational Technology Report Thursday, April 28, 2011 (Last Approved:

More information

BYOD Enabling Technologies

BYOD Enabling Technologies BYOD Enabling Technologies Bryan Padgett 1 Our Vision for BYOD AGILEX PROPRIETARY 2 The BYOD Challenge Platform Diversity U.S. Smartphone Platform Market Share, December 2014 Source: comscore MobiLens

More information

Centralize it Secure it Simplify IT!

Centralize it Secure it Simplify IT! Centralize it Secure it Simplify IT! Dedicated to helping network administrators and IT executives securely manage remote connections, network accesses, passwords and credentials. Remote Desktop Manager

More information

Mobile Device Management

Mobile Device Management Mobile Device Management The objective of this document is to provide you with context about mobile device management, for both ipad and Mac, to enable you to have a relevant conversation with your customer

More information

Technological Requirements of the TEACH Act

Technological Requirements of the TEACH Act Introduction Technological Requirements of the TEACH Act The President signed the Technology, Education and Copyright Harmonization Act (TEACH) on November 2, 2002. TEACH amends the copyright law by expanding

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Mobile Device as a Platform for Assured Identity for the Federal Workforce Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft

More information

Applications the centerpiece of a BYOD environment.

Applications the centerpiece of a BYOD environment. Applications the centerpiece of a BYOD environment. November 2012 Summary Most businesses today realize that it has become a necessity to offer solutions to help employees better manage both their business

More information

Lincoln Public Schools 2015 2018 Technology Plan. Vision for Technology Integration

Lincoln Public Schools 2015 2018 Technology Plan. Vision for Technology Integration Lincoln Public Schools 2015 2018 Technology Plan The introduction of Chromebooks for staff for the 2015-2016 school year will be a game changer for teaching and learning. This cost effective solution will

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

SMART Software for Mobile Devices Sales brief

SMART Software for Mobile Devices Sales brief SMART Software for Mobile Devices Sales brief For reseller use only This brief provides a summary of the information and tools available to assist in you in your conversations with education customers

More information

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

BEYOND LIMITATIONS CONNECTING POSSIBILITIES BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in

More information

HP ProCurve Networking certification for resellers. Place yourself above the competition

HP ProCurve Networking certification for resellers. Place yourself above the competition HP ProCurve Networking certification for resellers Place yourself above the competition HP ProCurve Certified Professional program tracks Highest certification HP ProCurve Program Sales certifications

More information

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users

More information

WLAN solutions to manage 1:1 and BYOD in K-12

WLAN solutions to manage 1:1 and BYOD in K-12 MERU EDUCATION-GRADE SOLUTIONS FOR UNINTERRUPTED LEARNING SOLUTION BRIEF K-12 WLAN solutions to manage 1:1 and BYOD in K-12 BYOD Solutions for K-12/primary schools 1:1 computing where students are provided

More information

Eastern Illinois University information technology services. strategic plan. January,

Eastern Illinois University information technology services. strategic plan. January, Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic

More information

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things

More information

Empowering Students with Mobility and BYOD Technology

Empowering Students with Mobility and BYOD Technology Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility

More information

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

How To Make Your School Successful Online

How To Make Your School Successful Online informed. Planning Considerations for K-12 Communications Technology frontier.com/enterprise 1 Executive Summary K-12 schools are increasingly wanting to leverage new digital learning technologies to make

More information

NANUET UFSD Instructional Technology Plan - Annually - 2015

NANUET UFSD Instructional Technology Plan - Annually - 2015 LEA Information A. LEA Information 1. What is the total student enrollment based on the most recent BEDS Day submission? 2. 2,209 What is the student enrollment by grade band based on the latest BEDS Day

More information

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access

More information

Bring Your Own Device (BYOD) for Staff and Visitors

Bring Your Own Device (BYOD) for Staff and Visitors Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source

More information

The Current Landscape

The Current Landscape SMALLER SCALE HAS MORE SPACING INSIDE LOGOMARK LARGE SCALE HAS LESS SPACING INSIDE LOGOMARK MOBILE APPLICATIONS MANAGEMENT December 2013 Prepared by Clarity Innovations Contributors: Steve Burt, Marie

More information

Network Essentials for Superintendents

Network Essentials for Superintendents Network Essentials for Superintendents Upgrade your network for digital learning UNDERSTAND. How can I improve my network? As a district leader, you can help most in the planning and implementation of

More information

ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY

ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY Presenter October, 2014 MOBILITY AND THE APPLICATION INVASION 1.2 Billion SMART PHONES TO BE SHIPPED IN 2014 IDC Mobility is #1 PRIORITY

More information

CHAPTER 6 NETWORK DESIGN

CHAPTER 6 NETWORK DESIGN CHAPTER 6 NETWORK DESIGN Chapter Summary This chapter starts the next section of the book, which focuses on how we design networks. We usually design networks in six network architecture components: Local

More information

Bring Your Own Device (BYOD) Launches September 2015 Students in Grades 9-12. The How of BYOD

Bring Your Own Device (BYOD) Launches September 2015 Students in Grades 9-12. The How of BYOD Bring Your Own Device (BYOD) Launches September 2015 Students in Grades 9-12 The How of BYOD How is the school preparing for a successful launch of a BYOD for students in Grades 9 12? This document covers

More information

NEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS

NEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS NEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS Unlocking the infinite possibilities of communications SUMMARY The city of Taguig, known for its openness to technological innovations, has recently implemented

More information

Dell Connected Learning for Schools. Transforming Education for the Digital Age

Dell Connected Learning for Schools. Transforming Education for the Digital Age Dell Connected Learning for Schools Transforming Education for the Digital Age This document was created to provide Dell s point of view for primary and secondary schools and contains the following sections:

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Readying Your Campus for Mobile Learning and BYOD

Readying Your Campus for Mobile Learning and BYOD Readying Your Campus for Mobile Learning and BYOD A Guide to Strategy and Planning Produced by For additional copies or to download this document, please visit: www.convergemag.com/mobilelearning 2012

More information

How Nokia deployed AirWatch MDM for Nokia Lumia

How Nokia deployed AirWatch MDM for Nokia Lumia How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned

More information

The IT Managers Guide to selecting a cost-efficient platform for bedside Patient Entertainment

The IT Managers Guide to selecting a cost-efficient platform for bedside Patient Entertainment White Paper Patient Entertainment Solutions The IT Managers Guide to selecting a cost-efficient platform for bedside Patient Entertainment Why you need to consider the critical decision of Thin Client

More information

Strategic Plan FY 2014-2016

Strategic Plan FY 2014-2016 Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION

More information

BYOD (Bring Your Own Device)

BYOD (Bring Your Own Device) BYOD (Bring Your Own Device) Goal: As school districts budgets shrink and the need for technology resources increases, districts must find creative ways to bring technology into the schools. We are exploring

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

BYOD Strategy - Advantages and Disadvantages

BYOD Strategy - Advantages and Disadvantages BRING YOUR OWN DEVICE AN INTRODUCTION BYOD An Introduction 3 The Management Challenge and Opportunity 5 Adopting a Step by Step BYOD Strategy 8 BYOD It s Time 14 1NService Your BYOD Partner 15 Copyright

More information

Building a Comprehensive Mobile Security Strategy

Building a Comprehensive Mobile Security Strategy WHITE PAPER Building a Comprehensive Mobile Security Strategy A key to safeguarding data and apps is finding the right partner. protecting mobile environments has become more complex. Fortunately, solutions

More information

a s t r at egy paper fr om Mobile Learning: Preparing for BYOD (Bring Your Own Device)

a s t r at egy paper fr om Mobile Learning: Preparing for BYOD (Bring Your Own Device) a s t r at egy paper fr om Mobile Learning: Preparing for BYOD (Bring Your Own Device) Mobile Learning: Preparing for BYOD (Bring Your Own Device) The BYOD Concept The days of students carrying heavy,

More information

TECHNOLOGY AND OUR STUDENTS. A Rationale and Proposal for Expansion

TECHNOLOGY AND OUR STUDENTS. A Rationale and Proposal for Expansion TECHNOLOGY AND OUR STUDENTS A Rationale and Proposal for Expansion Expanding the 1:1 program already in grades 5 8 to Mira Costa High School with a Bring Your Own Device Model June 5, 2013 BYOD AT MIRA

More information

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since

More information

Deploying Apple ios in Education

Deploying Apple ios in Education Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7

More information

Jack West Lead Educator Hapara Team Twitter @hapara_team

Jack West Lead Educator Hapara Team Twitter @hapara_team Jack West Lead Educator Hapara Team Twitter @hapara_team goo.gl/pgieid Schools in 180 countries have gone Google Source: Google Marketing Source: statcounter.com 0.2% in 2012 9.6% in 2013 Why? Joel Handler

More information

For Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION

For Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION For Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION Android Tablets in Education Tablet initiatives are revolutionising how schools meet and deliver their vision

More information

Mobilize to Rightsize Your Network

Mobilize to Rightsize Your Network Mobilize to Rightsize Your Network Table of Contents How enterprise mobility can reduce the total cost of network ownership by 70 percent 3 Mobility means cost savings 3 Getting started on savings 4 Make

More information

Mobility Impact on the Enterprise

Mobility Impact on the Enterprise BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device

More information

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com CellCast Solution for BlackBerry Smartphones Security Overview Revised: June 2010 www.mlearning.com Introduction The CellCast Solution for BlackBerry empowers sales, service and other remote teams to distribute

More information

BYOD & Virtualization: Managing Mobile

BYOD & Virtualization: Managing Mobile White Paper 01 Finches Only 02 ViewSonic Only BYOD & Virtualization: Managing Mobile Devices from the Desktop Erik Willey 04.15.2014 SUMMARY: Integrated with Citrix XenMobile, ViewSonic s SD-A245 smart

More information

Triad Local School District Bring Your Own Device Student Device User Agreement 7540.031F1

Triad Local School District Bring Your Own Device Student Device User Agreement 7540.031F1 Triad School District BYOD Implementation Guide and Procedures Guide Contents: Introduction 1. Why BYOD at Triad? Page 2 2. What is BYOD? Page 3 3. Network/Infrastructure 4. FAQs 5. Parents Page 6 6. Students

More information

New York State Education Department Instructional technology plan survey

New York State Education Department Instructional technology plan survey The instructional technology plan survey is designed to allow districts the opportunity to compile all data related to their technology planning and needs in one location. The data collected in the survey

More information

ty School District Digita al Classrooms Plan

ty School District Digita al Classrooms Plan Nassau Count ty School District Digita al Classrooms Plan Nassau County School Districtt Digital Classrooms Plan 1 P age The intent of the District Digital Classroom Plan (DCP) is to provide a perspective

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission Program Summary DoIT is responsible for negotiating and licensing software available as a site- wide license as well as many volume- license purchases for specific College or divisional use. DoIT also

More information

Intelligent, Functional and Effective Gateways for Small Business Applications

Intelligent, Functional and Effective Gateways for Small Business Applications Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime

More information

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security

More information

LuminonCore Virtual Desktop Infrastructure (VDI) Products

LuminonCore Virtual Desktop Infrastructure (VDI) Products LuminonCore Virtual Desktop Infrastructure (VDI) Products LuminonCore VDI products eliminate your doubts on current virtual desktop products from the market. LuminonCore VDI brings totally upgraded desktop

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

BYOD Strategy (Service Mobility) 2014

BYOD Strategy (Service Mobility) 2014 Information Resources BYOD Strategy (Service Mobility) 2014 BYOD Strategy Group Joseph Casabona Lee DeAngelis Adam Edwards Diane Kennedy Calvin Krzywiec (Chair) Timothy Meade Glen Pace Jason Wimmer 1 Summary

More information

***NOTICE***: Proposed Selection Date now 12/16/13

***NOTICE***: Proposed Selection Date now 12/16/13 Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out

More information

An Intelligent Solution for the Mobile Enterprise

An Intelligent Solution for the Mobile Enterprise An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of

More information

The 9 Pillars of Enterprise Mobility

The 9 Pillars of Enterprise Mobility The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

AC 2012-3701: LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID. Dr. Se Jun Song, Texas A&M University, College Station

AC 2012-3701: LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID. Dr. Se Jun Song, Texas A&M University, College Station AC 2012-3701: LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID Dr. Se Jun Song, Texas A&M University, College Station c American Society for Engineering Education, 2012 Lessons

More information

Technology Department Infrastructure & Support

Technology Department Infrastructure & Support Technology Department Infrastructure & Support The Technology Department Team Executive Director of Technology Technology Coordinator Network Engineer Application Administrator Application Specialist Infrastructure

More information

Compliance Ready Mobile Device Management (MDM)

Compliance Ready Mobile Device Management (MDM) Presenting Network Security Solutions: Compliance Ready Mobile Device Management (MDM) Presenters: Your Name iboss Network Security Your Title Background on iboss Network Security Over Nine Years of Engineering:

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Meraki 2015 Solution Brochure

Meraki 2015 Solution Brochure Meraki 2015 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.

More information

FY15 UW-Parkside Institutional IT Plan Report

FY15 UW-Parkside Institutional IT Plan Report FY15 UW-Parkside Institutional IT Plan Report A. Information Technology & University Strategic Objectives [1-2 pages] 1. How was the plan developed? The plan is a compilation of input received from a wide

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information