mlearn
14.9K views | +4 today
Follow
mlearn
Mobile Learning and learners
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

5 Critical Mistakes Schools Make With iPads (And How To Correct Them) | Reality

5 Critical Mistakes Schools Make With iPads (And How To Correct Them) | Reality | mlearn | Scoop.it

Focusing on iPad-versus.-laptop comparisons stifles the ability to see how the iPad facilitates student-centered learning. iPads are devices meant to compliment computers, not replace them.

So, people who seek equivalent functionality become frustrated, and fail to realize the intrinsic benefits and features of the iPad’s native design.


Instead, schools should focus their energies on what iPads do best to engender active learning. iPads enable students to kinesthetically connect with their work (especially important for young learners). These tactile elements – using fingers to zoom, rotate in, pinch close, or swipe across – as well as increasingly interactive and immersive apps, facilitate hands-on learning.


Gust MEES: DON'T forget ALSO about that the working force needs people who are FIT in Windows Computers as THE main OS is STILL WINDOWS!!!



Via Gust MEES
more...
Madeline Case's curator insight, December 27, 2014 8:36 PM

Just think, these students don't realize that iPads are not something to be used alone. I've seen many people with their tablets/pads and a laptop complimenting/corroborating with each other.

Mohamed Bouri's curator insight, December 30, 2014 6:27 PM

Our schools lack iPads, but these tips may be helpful if your students use them!

Alex Enkerli's curator insight, January 5, 2015 9:19 AM

Educational appropriation of tablets is getting past the hype.

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | mlearn | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 


Via Gust MEES
more...
Gust MEES's curator insight, October 10, 2013 4:53 PM

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by michel verstrepen from Latest Social Media News
Scoop.it!

Oxygen Forensic Suite 2012 - Forensic Software for Cell Phones, Smartphones and other Mobile Devices

Oxygen Forensic Suite 2012 - Forensic Software for Cell Phones, Smartphones and other Mobile Devices | mlearn | Scoop.it
Oxygen Forensic Suite 2012 - Mobile forensic software for cell phones, smartphones and other mobile devices...

 

Read more:

http://www.oxygen-forensic.com/en/

 


Via Gust MEES, Gerrit Bes
more...
No comment yet.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

BrightTALK Webcast - Mobile Security Summit July12

BrightTALK Webcast - Mobile Security Summit July12 | mlearn | Scoop.it

Why Mobile Device Management Needs Mobile Security... A MUST for "Bring Your Own Device" (BYOD)!

 

Read more:

http://www.websense.com/content/brighttalk-mobile-security-webcast.aspx?cmpid=prtw

 


Via Gust MEES
more...
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

iOS tombe et Windows Phone résiste lors d’une compétition de hackers

iOS tombe et Windows Phone résiste lors d’une compétition de hackers | mlearn | Scoop.it
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Via Gust MEES
more...
Gust MEES's curator insight, November 15, 2014 3:58 AM

L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Gust MEES's curator insight, November 15, 2014 4:02 AM
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | mlearn | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

Via Gust MEES
more...
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

For BYOD Best Practices, Secure Data, Not Devices

For BYOD Best Practices, Secure Data, Not Devices | mlearn | Scoop.it

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

 

Read more, very interesting...:

http://trap.it/KpeRhS

 


Via Gust MEES
more...
No comment yet.
Rescooped by michel verstrepen from ICT Security Tools
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | mlearn | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...


Via Gust MEES
more...
No comment yet.