iPads in high school
Follow
1.5K views | +0 today
iPads in high school
Creative and curricular ideas and resources for teaching with an iPad
Curated by Carol Ann Sass
Your new post is loading...
Your new post is loading...
Rescooped by Carol Ann Sass from 21st Century Learning and Teaching
Scoop.it!

Now it’s BYOA to follow BYOD

Now it’s BYOA to follow BYOD | iPads in high school | Scoop.it
A topic in business I hear being talked about a lot is “bring your own device” – BYOD for short – that illustrates some of the profound changes taking place in the workplace in how people use (and want to...

 

It’s no longer about the device, says the Telegraph – now it’s about the apps that the employee uses. It’s been dubbed BYOA or “bring your own apps.”

 

Read more, a MUST:

http://www.nevillehobson.com/2012/10/14/now-its-byoa-to-follow-byod/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Carol Ann Sass from BYOD iPads
Scoop.it!

Connectivism - Emerging Perspectives on Learning, Teaching and Technology

Connectivism - Emerging Perspectives on Learning, Teaching and Technology | iPads in high school | Scoop.it

Via Ana Cristina Pratas, Gust MEES, Jenny Smith
more...
No comment yet.
Rescooped by Carol Ann Sass from 21st Century Learning and Teaching
Scoop.it!

How Apple let a hacker remotely wipe an iPhone, iPad, MacBook

How Apple let a hacker remotely wipe an iPhone, iPad, MacBook | iPads in high school | Scoop.it
Summary: Gizmodo's Twitter account was recently hacked, after a former employee's iCloud account was breached, and all his Apple devices (iPhone, iPad, MacBook Air) were remotely wiped.

 

Gust MEES: Why this security article here? This will show YOU that "Nobody is Perfect" and that WE ALL have to learn about IT-Security, especially Teachers, Educators, Instructors... It's our responsibilty to give best advice about e-Learning, and IT-Security is part of e-Learning in 21st Century ;)

 

Check also my FREE courses about basic knowledge of IT-Security:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

 

 

Read more (nobody is perfect)...:

http://knolinfos.visibli.com/share/yETAZs

 


Via Gust MEES
more...
No comment yet.