Leadership Think ...
Follow
Find tag "BYOD"
50.1K views | +31 today
Leadership Think Tank
Educational leadership in action
Curated by Aki Puustinen
Your new post is loading...
Your new post is loading...
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

BYOD: The Good, The Bad and the Ugly [Infographic]

BYOD: The Good, The Bad and the Ugly [Infographic] | Leadership Think Tank | Scoop.it

Via Gust MEES
more...
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Teaching With Tablets

Teaching With Tablets | Leadership Think Tank | Scoop.it
Tablets can be used for much more than playing games and reading the latest e-books. Learn more about how tablets are also changing the face of education.

 

 

 

Read more:

http://www.onlineuniversities.com/blog/2012/08/teaching-with-tablets/

 


Via Gust MEES
more...
edtechie's comment, August 25, 2012 7:38 PM
Love this!
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Nearly half of firms supporting BYOD report data breaches

Nearly half of firms supporting BYOD report data breaches | Leadership Think Tank | Scoop.it
Nearly half of enterprises that allow employee-owned devices to connect to a company’s network have experienced a data breach, a study has revealed.

 

Most of these companies reacted by restricting data access rights (45%) or installing security software (43%), according to the survey of 400 IT professionals by Decisive Analytics.

 

Read more, a MUST:

http://www.computerweekly.com/news/2240161202/Nearly-half-of-firms-supporting-BYOD-report-data-breaches?utm_source=dlvr.it&utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple acquires fingerprint scanner firm AuthenTec

Apple acquires fingerprint scanner firm AuthenTec | Leadership Think Tank | Scoop.it
Apple has snapped up AuthenTec, a Delaware-based company that specializes in security systems such as fingerprint scanners.

 

So what does Apple want with AuthenTec? Are we about to see fingerprint scanners embedded in all our MacBooks? My guess is not so much on that front. But AuthenTec makes security-related products for other platforms, too. For example, the company has helped develop a system for Android devices where a fingerprint scanner is used in conjunction with mobile wallet functionality, as a way to secure payments.

 

Apple does tend to acquire small companies from time to time, usually in areas that it wants to control. For example, the company acquired a number of mapping firms that formed the basis of its iOS 6 mapping technology, bought up chip-maker PA Semi so it could design its own processor, and purchased Siri to make, well, Siri. In all of those cases, there was some lag time between the acquisition of the firm and the revelation of exactly what Apple was doing with the technology; if that holds true in this case, then a year or so from now, we’ll probably have the answer.

 

Apple did not respond to Macworld's request for comment as of this writing.

 

Gust MEES: something to watch in the future...

 

Read more:

http://www.macworld.com/article/1167917/apple_acquires_fingerprint_scanner_firm_authentec.html#lsrc=twt_macworld

 


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

BYOT: An idea whose time has come

BYOT: An idea whose time has come | Leadership Think Tank | Scoop.it
The time is now for districts and schools to seriously consider developing a bring-your-own-technology (BYOT) initiative.

 

 

 

 

Read more:

http://smartblogs.com/education/2012/07/05/byot-an-idea-whose-time-come/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

How to Launch a Successful BYOD Program

How to Launch a Successful BYOD Program | Leadership Think Tank | Scoop.it


Katy Independent School District (ISD) has a student population of 63,000 students and 56 schools – elementary, middle and high schools. There are 83 languages spoken by students in the district and 31 percent of the student population is on free or reduced lunch programs.

 

In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.

 

Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://knolinfos.visibli.com/share/ZcOoM3

 


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from QR-Code and its applications
Scoop.it!

Norton Snap QR Code Reader for iPhone, iPod touch

NEW! Norton™ Labs Snap is the first QR code scanner that protects you, your mobile device, and your important Stuff from online threats by warning you of dangerous QR codes and blocking unsafe websites before they load on your device.

 

Download Norton Snap QR Code Reader and enjoy it on your iPhone, iPad, and iPod touch.


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Going BYOD

Going BYOD | Leadership Think Tank | Scoop.it

Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

BYOD: Haven’t got a policy? Maybe it’s time you did

BYOD: Haven’t got a policy? Maybe it’s time you did | Leadership Think Tank | Scoop.it
Most organisations still don’t have a strategy for dealing with the demands of bring your own device - but pressure to have one continues to bui...

 

As a result, he said, companies are increasingly putting a BYOD policy in place. According to IDC’s research, 20 per cent of companies have a BYOD policy in place and 15 per cent are working on it. But that leaves the majority - 65 per cent - nowhere on this issue yet.

 

Simon Gale, CTO at IBM workplace services, said that as a result of BYOD, IT organisations are looking for new ways to secure their infrastructure, as the security perimeter changes from the physical device to the data.

 

“You had a standardised layer that was the device and the operating system. What BYOD is doing is taking away that opportunity for standardisation and so the IT department is trying to work out where that level is”.

 

Read more:

http://www.techrepublic.com/blog/european-technology/byod-havent-got-a-policy-maybe-its-time-you-did/850?tag=nl.e101

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

What Teachers + Educators should learn about BYOD

What Teachers + Educators should learn about BYOD | Leadership Think Tank | Scoop.it

What Teachers + Educators should learn about BYOD

 

Gust MEES:

Most of articles, blogs and Tweets witten by educational people are showing the advantages of "Bring Your Own Device" (BYOD) and they embrace very well BYOD, which I do also; but...

 

 

 

There are some more things to consider such as:

 

- A BYOD Policy in the campus, school...

 

- Prepare for BYOD in your organization 

 

Read my complete curation about it here:

http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD

 

 

===> Read also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=eCitizen

 

Responsability as eCitizen for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST ;) <=== 

 


Via Gust MEES
more...
No comment yet.