mlearn
Follow
Find tag "Education 3.0"
13.6K views | +1 today
mlearn
Mobile Learning and learners
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

5 Critical Mistakes Schools Make With iPads (And How To Correct Them) | Reality

5 Critical Mistakes Schools Make With iPads (And How To Correct Them) | Reality | mlearn | Scoop.it

Focusing on iPad-versus.-laptop comparisons stifles the ability to see how the iPad facilitates student-centered learning. iPads are devices meant to compliment computers, not replace them.

So, people who seek equivalent functionality become frustrated, and fail to realize the intrinsic benefits and features of the iPad’s native design.


Instead, schools should focus their energies on what iPads do best to engender active learning. iPads enable students to kinesthetically connect with their work (especially important for young learners). These tactile elements – using fingers to zoom, rotate in, pinch close, or swipe across – as well as increasingly interactive and immersive apps, facilitate hands-on learning.


Gust MEES: DON'T forget ALSO about that the working force needs people who are FIT in Windows Computers as THE main OS is STILL WINDOWS!!!



Via Gust MEES
more...
Madeline Case's curator insight, December 27, 2014 8:36 PM

Just think, these students don't realize that iPads are not something to be used alone. I've seen many people with their tablets/pads and a laptop complimenting/corroborating with each other.

Mohamed Bouri's curator insight, December 30, 2014 6:27 PM

Our schools lack iPads, but these tips may be helpful if your students use them!

Alex Enkerli's curator insight, January 5, 9:19 AM

Educational appropriation of tablets is getting past the hype.

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | mlearn | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 


Via Gust MEES
more...
Gust MEES's curator insight, October 10, 2013 4:53 PM

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

iOS tombe et Windows Phone résiste lors d’une compétition de hackers

iOS tombe et Windows Phone résiste lors d’une compétition de hackers | mlearn | Scoop.it
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Via Gust MEES
more...
Gust MEES's curator insight, November 15, 2014 3:58 AM

L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Gust MEES's curator insight, November 15, 2014 4:02 AM
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Study: Mobile phone apps view private data more than necessary

Study: Mobile phone apps view private data more than necessary | mlearn | Scoop.it
Mobile phone apps are accessing users' private data and transmitting it to remote servers far more than appears strictly necessary, while users have inadequate tools to monitor or control such access, according to a new study by two French...

Via Gust MEES
more...