News
Two community colleges in Massachusetts will be trying out a blended model of instruction that integrates online content from edX. MoreMaking university websites and course content accessible may be the law, but many institutions have a long way to go toward compliance. CT looks at three key elements of a more proactive approach to accessibility on campus. MoreResearch by a small team at the Massachusetts Institute of Technology may turn out to help streamline the processing of big data--those terabytes of streaming data that are generated from GPSs in smartphones and a multitude of other sensors. MoreMicrosoft has revealed details about its forthcoming Surface tablet device running Windows 8 Pro. More
A consortium of education organizations will be developing an online repository of classroom videos to help new teachers learn from master instructors how to teach math and science topics in third through sixth grades. MoreColleges and universities in 12 midwestern states now have the option as consortium partners of using cloud storage, virtual machine hosting, and Web hosting. MoreSaddleback College in Mission Viejo, CA, has begun implementing wireless multifunctional switches from Hitachi to gain wireless connectivity between data and video sources and compatible Hitachi LCD projectors. MoreThe Tennessee Board of Regents has selected a cloud-based spend management solution to help automate and streamline business processes across the system's 19 colleges and universities. More
Professional Resources
-
The Impact of Projection Sysytems on Learning
Sponsored by: Canon
In this Thought Leadership report, Campus Technology spoke with 5
universities to provide you with answers to tough questions on
evaluating projection systems, and to help you make the case for
adopting new, innovative technology in the classroom that will
undoubtedly improve learning outcomes.
- Research Results: Print Security in Education
Sponsored by: HP
Campus Technology asked their readers about how education institutions
address protecting sensitive, confidential data as it relates to
printer security. Their responses to sixteen questions are enclosed
in this report–and they reveal an imperfect world.
|
|
|