Seven Steps to Improving Operational Efficiency with Technology-Enabled 1-to-1 Learning

Similar documents
ios Education Deployment Overview

Proactive. Professional. IT Support and Remote Network Monitoring.

Why Consider Cloud-Based Applications?

Microsoft Windows Intune: Cloud-based solution

Leveraging security from the cloud

Remote Services. Managing Open Systems with Remote Services

Dell Connected Learning for Schools. Transforming Education for the Digital Age

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Information Technology Solutions. Managed IT Services

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

White Paper FASTFILE / Page 1

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Information Technology Services

IT Strategic Plan INFRASTRUCTURE PROPERTIES AND PLANNING

Cisco Security Optimization Service

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only

Five keys to a more secure data environment

Christian Family & Children s Center Champion Christian School Technology Plan Outline January 2009

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

LHRIC Network Support - Additional Service Features

Introduction. PCI DSS Overview

AVG AntiVirus. How does this benefit you?

NETWORK SECURITY GUIDELINES

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Protect Students. Secure Data. Improve Productivity. Advanced IT Solutions to Secure and Enrich Your K-12 Community

Bright Local Schools BYOD Acceptable Use Policy

Challenges and Solutions

Protecting Your Roaming Workforce With Cloud-Based Security

Why cloud backup? Top 10 reasons

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Remote MasterMind for Mobility. Mobile Device Management Software

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Backup Exec System Recovery Management Solution 2010 FAQ

Desktop Virtualization in the Educational Environment

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

The Essential Guide for Protecting Your Legal Practice From IT Downtime

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

How Cloud Computing Can Accelerate Endpoint Encryption:

CA IT Client Manager. Desktop Migration

1:1 Student Tablet Program Frequently Asked Questions

Internet threats: steps to security for your small business

Proven LANDesk Solutions

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

WHITEPAPER: The advantages of system automation tools in remote management systems

IBM Endpoint Manager for Core Protection

HIPAA Security Balancing Security & Costs

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Maestro Managed Services from Silicon allows organisations large and small to forget about internal IT systems management and support and instead

How To Get A Client Side Virtualization Solution For Your Financial Services Business

BEST PRACTICES. Systems Management.

Desktop as a Service (DaaS): A Solution for Modern Agencies

WHY CLOUD BACKUP: TOP 10 REASONS

Best Practices for Protecting Laptop Data

CompleteCare+ Enterprise Voice

Best Practices for Information Security and IT Governance. A Management Perspective

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Remote control/problem resolution

Kaspersky Lab s Full Disk Encryption Technology

Better protection for customers, and recurring revenue for you!

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Data Backup Options for SME s

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

A Comprehensive Plan to Simplify Endpoint Encryption

Backup Your Data and Keep it in Canada

Remote Control/Problem Resolution

The Encryption Anywhere Data Protection Platform

Take Your Vision to the Cloud

Decrease your HMI/SCADA risk

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Technical Brief: Virtualization

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

With Eversync s cloud data tiering, the customer can tier data protection as follows:

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

DriveLock and Windows 7

Why Corporations Need to Automate IT Systems Management

How To Protect Your Network From Attack From A Network Security Threat

plantemoran.com What School Personnel Administrators Need to know

McAfee epolicy Orchestrator * Deep Command *

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

AVLOR SERVER CLOUD RECOVERY

Device Lifecycle Management

PAR EverServ Services

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage

For your eyes only - Encryption and DLP Erkko Skantz

ios Enterprise Deployment Overview

SITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER. Job Description

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

MSP Service Matrix. Servers

Navigating Endpoint Encryption Technologies

Regional School District No. 7. Bring Your Own Device (BYOD) and Protocol for the Use of Technology in the Schools

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version /03/2014

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Transcription:

Seven Steps to Improving Operational Efficiency with Technology-Enabled 1-to-1 Learning SPONSORED BY

While much has been written about the improved learning outcomes associated with 1-to-1 computing, less is known about this innovative learning model s effect on operational efficiency. But improved operation efficiency is no longer a secondary benefit. With falling tax bases and escalating pressure to rethink education from top to bottom, adopting 1-to-1 technology access has become a way to improve efficiency and lower cost. This white paper explains how. Overworked educational IT professionals, a linchpin to the success of 1-to-1 computing, consistently function in a reactive mode. This is in part due to the fact that they are supporting so many users. A single IT support staffer in K-12 handles many more users than commonly seen in the business world. 1 SCHOOL IT STAFFS IN THE U.S. ARE STRETCHED THIN Mean number of computers per technician Mean ratio of students to technicians Mean ratio of students to all technical support staff Do not have enough staff to plan for new technology Do not have enough staff to implement new technologies Do not have enough staff to implement new technologies technology in the classroom School has a secure remote access system 956 2,401-to-1 1,320-to-1 57% 70% 72% 72% School using cloud-based systems 52% Source: The Unique Challenges Facing the IT Professional in K-12 Education, (2010). SchoolDude. com and the Consortium of School Networking This white paper shows you how K-12 schools and districts can manage costs and improve efficiency across seven key operational areas as you progress toward the goal of 1-to-1 computing. 1. OPTIMIZE INFRASTRUCTURE TO SUPPORT CLASSROOMS Operational efficiency begins with technology infrastructure. Consider the experiences of one leading 1-to-1 pioneer: the Department of Education s statewide initiative in Pennsylvania. Pennsylvania s Classrooms for the Future program, a statewide 1-to-1 computing initiative, transformed the way high school teachers teach and the way their students learn by equipping English, math, science and social studies classrooms with Internetconnected laptops and advanced resources. More than 12,000 teachers and 500,000 students in the state s high schools now benefit from a 21st Century learning environment called School 2.0. 2 Review the differences in the two teaching approaches, School 1.0 (traditional environment) and School 2.0 (the computer-powered 1-to-1 learning environment), to see the pivotal importance of technical infrastructure in this new learning model. 2

SCHOOL 2.0 INCREASES STRESS ON INFRASTRUCTURE School 1.0 School 2.0 Teacher centered Content coverage Memorizing information Lecturer Whole group configuration Single instructional and learning modality Memorization and recall Learner centered Learning by doing Using information Facilitator/Co-learner Flexible grouping configuration Multiple instruction and learning modalities to include all students Higher order thinking skills creativity As instructional practices became more rigorous, student-centered and relevant, demands on the computing infrastructure to support School 2.0 escalate as well. In Pennsylvania, schools biggest IT challenges involved network capacity being able to authenticate the volume of sign-ons at the beginning of class, and storing work so that students could resume assignments during study periods. In addition to extensive capacity testing to ensure the network could handle the heavy sign-on load, IT professionals set up an electronic drop box on the server where students could store partially completed assignments as they moved from class to class. A second operational concern in Pennsylvania centered on helping teachers gain the most leverage from the devices a common hurdle seen in the early stages of 1-to-1 computing implementation. The state s Department of Education helped underwrite the cost of hands-on computing programs for teachers; online courses for group learning; and instructional coaches, computer-savvy teachers who helped their peers re-engineer their teaching methods to make the most of the new technical capabilities. 2. EFFICIENTLY BUILD & DEPLOY CUSTOM DEVICE IMAGES Building a device s image, that is, loading the applications, tools and security even hard drive encryption needed by a specific user group, takes a mind-boggling amount of time and effort. Supporting those images over the lifetime of the device becomes more complex each time a new version of an application is issued or a security patch is distributed. And multiply that complexity every time you introduce and support a new image. The key to imaging is a form of mass customization, selecting a few key user types of personas and then building standardized images for them. Because districts and schools operate with such lean IT staffs, many are turning to automatedimaging systems to automate the process of creating custom images. Security, authentication and defense filters are built into each custom image. By specifying which images are needed by each group (students, teachers, staff and administrators) schools then receive secure devices pre-loaded with everything each profile needs. During the lifetime of a device, you can expect a system migration or two. Usually thought of as a highly intensive process, the proper imaging approach can save time and money here as well. Over the lifetime of a device, custom imaging can save a school $179 per PC, based on research. 3 3. MINIMIZE CLASSROOM DISRUPTIONS WITH RELIABLE HARDWARE Over the lifetime of a device, custom imaging can saves a school $179 per PC, based on research. Consider your computing devices to be engaged in extreme mobility every day. Count on students to jostle, bump and drop their computers, and don t forget to expect the occasional spill as well. To avoid the downtime that stops learning in its tracks, 3

you ll want to choose durable, reliable computing devices that take everything students can dish out in the classroom, on the road and at home. In addition to durability, look for devices with glare-minimizing screens that perform as well outdoors as they do in the classroom. Finally, rate your device choices for their energy efficiency. The longer students can go between recharges, the more productive they ll be. 4. STREAMLINE PC MAINTENANCE AND SUPPORT Some schools have formed Student Technology Teams to handle minor troubleshooting and leverage overburdened IT staffs. These schools report that the student approach works well and frees the IT staff to concentrate their efforts on more complex issues. Another way to stretch scarce IT support staff centers on using tools to automate time-consuming but essential tasks such as maintaining a device inventory. Programs are available that provide IT staffs with a central console they can use to automatically maintain an up-to-the-minute accurate inventory of network users. Distributing security patches and performing system upgrades also takes a great deal of time and requires IT support to be everywhere at once, a feat usually reserved for superheroes. Console-based tools remotely diagnose and repair problems, such as improper BIOS settings, corrupted bootloaders and failed hard drives. In addition, these tools distribute patches and perform upgrades seamlessly. IT not only can minimize desk-side visits, but can resolve common problems quickly, efficiently and reliably. 5. PROTECT DATA WITH OFF- SITE BACKUP One of the most compelling operational reasons to implement a 1-to-1 computing initiative is access to the wealth of performance-related data the system collects. This data can be critical to monitoring and measuring student performance, and fine-tuning curriculum. Finally, data holds the key to satisfying regulators need for accountability and transparency in documenting academic progress and areas of opportunity. As educators become increasingly dependent on this data for decision-making, it is imperative that the data be accurate, up-to-date and available. You can move data electronically and seamlessly to a secure, off-site data encryption and storage capability. Look into online cloud-based data backup services for students, teachers and staff as well. These save you from having to integrate a backup technology into your existing infrastructure or buy additional hardware. 6. TAKE A LAYERED APPROACH TO SECURITY Effectively securing your computing environment requires a layered approach to security, which includes endpoint security, lost asset protection and encryption. When it comes to endpoint security, for example, the days of protecting a computer with a password have gone the way of the dinosaur. Today, fingerprint readers, for example, are much better deterrents. Antivirus protection is required, especially given the frequency of Internet downloads in academic pursuits. To deter theft and protect confidential data, schools and districts should implement encryption solutions. These protective solutions include integrated software- and hardwarebased encryption, password management and fingerprint identity technology. Hardware-embedded encryption is faster and less expensive than software-based options. When students, teachers and staff back up their work, 4

they can use a USB with this same FDE capability to ensure that their data remains encrypted. Lost asset protection becomes a high-level concern when you have hundreds or even thousands of computers on campus. However, protecting devices (and their data) doesn t stop when students, teachers and staff leave the premises. You can set up your IT infrastructure to automatically alert you whenever a PC that does not conform to your security standards, tries to log onto your network, or even when an authorized PC with a virus attempts to log in. You can also set up ways to lock hard drives remotely. Wi-Fi enabled triangulation serves as a highly precise tracking system for missing computers, allowing law enforcement to recover the devices, usually found in warehouses full of stolen merchandise. 7. ASSURE ONLINE SAFETY WITH CONTENT FILTERING There s device and data security and then there s online safety. Districts and schools want to keep students working online safe by protecting them from inappropriate content as well as solicitation, cyber bullying and malicious web proxies. The Children s Internet Protection Act (CIPA) sets out a fairly rigorous test of online safety. Districts and schools that fail to follow the CIPA regulations can lose their E-Rate financial assistance, a federal program which helps defray the cost of technology. For more information about Look for centralized, how to comply with CIPA s web-based administration regulations and protect tools that enable IT to control your E-Rate funding, visit Internet access and activity http://www.fcc.gov/wcb/ globally, or to segment levels tapd/universal_service of access by user group. With proper authorization, teachers can override the controls as needed. Additionally, IT staff can manage Internet access whenever students are online from any location on or off the network. This capability protects computers from infection and students from online threats anywhere, anytime. This same level of detailed reporting can be used to validate proposed investments in technology, subscription-based content and other fee-based services. AUTOMATED TOOLS STREAMLINE EFFICIENCY Overworked IT support staffs at schools and in districts have little time to implement and manage technology in the classroom. However, tools like the ones outlined here can help IT leaders support 1-to-1 computing initiatives and gain operational efficiency at the same time. In these days of constrained budgets, implementing 1-to-1 computing can appear to be a daunting task. But as more than millions of students, teachers and staff will attest, 1-to-1 does more than improve learning outcomes. 1-to-1 helps IT staffs support student learning efficiently and cost-effectively. SOURCES 1 The Unique Challenges Facing the IT Professional In K-12 Education, (2010). SchoolDude.com & the Consortium of School Networking. Retrieved August 24, 2010 from http://i.i.com.com/cnwk.1d/html/itp/ schooldude-eschoolnews_theuniquechallengesfacingit Professionals-K12Education.pdf 2 Classrooms for the Future, Pennsylvania Department of Education, Education Hub, 2009. Retrieved July 25, 2010 from http://www.portal.state.pa.us/portal/ servert.pt/community/classrooms_for_the_future/475/ about_cff/202788 3 Morey, Timothy and Nambiar, Roopa (2010). Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles, Wipro Consulting Service Product Strategy and Architecture Practice, originally published in May 2009 and updated in January 2010. 5