Devices in K-12 Classrooms to Hit 20% by End of 2015
Devices in K-12 Classrooms to Hit 20% by End of 2015

According to a preview of the upcoming 2015 K-12 Horizon Report, it is forecasted that 20% of US classrooms will have implemented BYOD programs by the end of 2015, a marker or ‘mainstream’ status for BYOD. It’s anticipated that the K-12 space will see further impact from trends such as 3D printing, adaptive software and wearable technologies in the next few years.

There’s no doubt that technology has revolutionized the classroom, where more lessons are delivered through mobile devices and content has been gradually shifting to digital – video, online assessments, search tools and context-sensitive links all enhancing the learning process. The report examines how the shift in learning approaches, toward “students as creators” instead of consumers, and the rise of STEAM learning (science, technology, engineering and mathematics, plus the arts) is impacting technology adoption.

The influx of technology devices, and the use of BYOD tools, has introduced management and security issues into the education system. One missing device can not only throw off a lesson plan in the short term, it can take weeks or months to see a replacement come through from insurance. There’s also security risks for students associated with devices, with schools with known 1:1 programs being targeted by thieves.

In order to sustain the digital classroom, new technology must be introduced safely and efficiently by administrators. School IT staff must be able to remotely manage and secure all endpoints – regardless of form factor or operating system – from a single console.

Here at Absolute Software, we provide comprehensive security and management solutions. In fact, we currently protect 21 of the 25 largest K-12 School Districts in the United States with our solutions. We work collaboratively with these school districts to provide a safer environment while managing and securing mobile devices, including Absolute’s industry-only persistent monitoring, protection, investigation, and recovery services.

We have designed a number of programs to help both prevent and solve device crimes for our K-12 customers. Our programs are designed to manage an entire deployment, from desktops and laptops to tablets and smartphones. To learn more, visit our website.