IT Asset Management

Reinforce Learning with Summer Device Programs
Harold Reaves
Reinforce Learning with Summer Device Programs

Earlier this month, I wrote about how an end-of-year device collection policy may be an unnecessary drain on IT resources. With the support of endpoint tools, districts can perform remote device maintenance, keep track of device inventory and automatically enforce compliance with student privacy regulations such as the Children’s Internet Protection Act (CIPA). With these tools in place, it also becomes possible to support a year-round 1:1 program that...

READ MORE
What is Your K12 Device Policy for Summer Vacation?
Harold Reaves
What is Your K12 Device Policy for Summer Vacation?

As we approach school summer vacation, K12 school districts are preparing for end-of-year device support. For some school districts, this involves collecting, inventorying and checking over devices as they come in and are stored over the summer. For others, this involves creating a more comprehensive device management strategy to support the continued use of devices to support learning in the summer months. End-of-year device collection: Is it necessary? For...

READ MORE
Technology Education is a Community Effort
Harold Reaves
Technology Education is a Community Effort

As educators help shape our leaders of tomorrow, they rely on technology platforms to provide students with the skills they need for success. Recent data demonstrates that technology has the potential to boost student learning and test scores but technology fluency is only one piece of the puzzle. Perhaps equally as important is the notion that today’s educators have the opportunity to teach good digital citizenship, in order to instill long-term...

READ MORE
5 Ways to Improve Insider Threat Prevention
Richard Henderson
5 Ways to Improve Insider Threat Prevention

If you browsed the latest security headlines, you’d probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity. While we recently examined the rising of the politically motivated insider, the truth is that most incidents are traced back to employees...

READ MORE
The End of Help Desk Tickets
Kim Ellery
The End of Help Desk Tickets

Help Desk Tickets are annoying for everyone. I can’t log in. Why isn’t my VPN working? I got the blue screen of death. Why can’t I print? End users don’t like encountering problems that get in the way of their productivity and IT teams don’t like being tasked with repetitive and menial problems that get in the way of tackling bigger projects. Help desk tickets, and the continued rise in...

READ MORE