B.Y.O.D. Bring Your Own Device Considerations for Implementing an Open Mobile WiFi Campus By Kristin Morris M.E.T. program, June 2012 Boise State University.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Bring Your Own Device Russell Dyas Impero Software.
Networking Project By Tanya Rush Integrating Technology into the Classroom Curriculum.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Bring Your Own Device Initiative Dr. Laura Spencer Coordinator of Instructional Technology.
Communications Room: Router/WAP, Switch, Server, Patch Panel Communications Room: Router/WAP, Switch, Server, Patch Panel Hard-wired Ethernet Ports… Site.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Technology Briefing Dumas ISD Board of Trustees Board Training Meeting March 28, 2015.
BYOD Guidelines Crosswell Elementary. Definition of Device For purposes of BYOD, “Device” means a privately owned portable electronic device. That includes,
Idaho High School Wireless Project Joyce Popp Chief Information Officer.
Bring Your On Device. What is BYOD? Students bring an electronic device such as smart phone, laptop, I-Pad, etc to school for: Researching information-
LHHS – BYOD Pilot Project (DRAFT) April – June 2012.
Technology Budget Presented to Technology Subcommittee and Facilities Subcommittee.
24/7/365 Remote Computer Support. Program Overview.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
How to Integrate a WiFi Network for Mobile Devices
Bring Your Own Technology Stafford County Public Schools B – Be Responsible Y – Yours to Manage O – Observe Usage Guidelines T – Technology = Access.
Educational Technology Update.  Enterprise Wireless and Mobile Device Management Common Core Requirements Nationalized Standards Based Curriculum All.
WE FACILITATE TECHNOLOGY TRANSFORMATIONS THAT DRIVE & SUPPORT BUSINESS SUCCESS. We facilitate technology transformations that drive & support business.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
ARMS Bring Your Own Technology ARMS Media Committee 2012.
By David Chavez Wireless Laptops in Classrooms. Going Wireless! If you've been in an airport, coffee shop, library or hotel recently, chances are you've.
WINTER Template BYOD 01 Bring Your Own Device. PURPOSE 02 Bring Your Own Device (BYOD) is meant to supplement the technology that the school currently.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
February 23, Play Video BYOD can help students sharpen their 21st Century skills to work towards college and career readiness. Click.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Lessons Learned: Certification and Accreditation.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Ch 20. Computer Network Wireless Connections. Bluetooth3G MobileWiFi Speed3Mbit/s7.2Mbit/s54Mbit/s Coverage~10MCity – wide~50M CostFree$200 - $400 /monthFree.
BYOD GET WIRED!. WHAT IS BYOD? YOU MAY BRING A DEVICE SUCH AS: IPOD, IPAD, IPHONE, TABLET, KINDLE FIRE, OR ANY OTHER WIRELESS DEVICE.
An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209.
Android Mobile Security Krystal Salerno. Introductions.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
The Complete Solution Wireless Services. Understanding your Wireless Requirements Infrastructure is Key Budget Coverage Capacity Management Security Integration.
Bring Your Own Device in HCPSS. What is BYOD? BYOD stands for Bring Your Own Device Students and staff are welcome to bring their personal devices such.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
When do we start?  Day 1, Term 1, 2015  Years 7-12  Phones, Tablets and Laptops.
Technology Update October Bring Your Own Device (BYOD) Different stages of implementation (contingent on wireless infrastructure) Full School Partial.
Components of wireless LAN & Its connection to the Internet
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
Campus Network upgrade and Wi-Fi Rollout PHASE 3 - CHANGES & HOW THESE AFFECT USERS.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Chapter 1: Explore the Network
Using technology to teach? We provide assistance and classroom support.
Technology Report June 2015 Submitted and presented by: Adam Feind, CETL – CTO – Northwest ISD.
Technology Services. Technology Update WINSTON-SALEM/FORSYTH COUNTY SCHOOLS SEPTEMBER 2015.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Policies, Pitfalls and the Pursuit of BYOT Dave Mirra Jay Cooke Stafford County Public Schools.
Granby: 21 st Century Citizenship College and Career Ready with One to One Computing.
Administrative Computing Capabilities.  For each objective:  Define year targets  Define 3+ year targets  Refine policy, activities, budget.
Bring Your Own Device The Elementary Edition Bring Your Own Device Information for Teachers and Staff.
1 Mesh & Mobility: Opportunities in Transportation and Beyond.
Dial toll free number Visit Need support for your Antivirus issues We let you do your.
LAN & WAN Justin Huey.
Chapter 1: Exploring the Network
Bring Your Own Device Trialed BYOD laptop classes for 3 years in Year 10 (extension class), but tipping point needed to change pedagogy school wide…. so.
Quick Wireless Connect USB key - ELPAP09
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
Norton.com/Setup | +1(844) | Norton MyAccount.
 norton.com/setup - Norton Setup is a process to install and activate norton antivirus on your computer device such as PC, Laptop, Desktop, Mobile and.
Install and Activate Norton Antivirus norton.com/setup - Norton Setup is a process to install and activate norton antivirus on your computer device such.
Forsyth BYOT in the News
Measure E Technology Update
Roosevelt Union Free School District SMART Schools Investment Plan
Presentation transcript:

B.Y.O.D. Bring Your Own Device Considerations for Implementing an Open Mobile WiFi Campus By Kristin Morris M.E.T. program, June 2012 Boise State University

Why the big trend? BYOD (bring-your-own-device) is the current trend that budget pinched schools are considering across the country. With BYOD, students use their own laptops, tablets, iPhones and other mobile devices on the campus wireless network.

Students learn 30-80% faster with tech-based instruction Schools save on computer equipment, installations and maintenance So, to make the switch to B.Y.O.D.... what's involved?

Keys to Planning a successful conversion to a B.Y.O.D. campus: Alleviate security threats. Meet the need for better WiFi coverage and capacity. Confirm reliable connectivity.

Control WiFi access Provide Firewalls, site filtering, device registration and free virus protection to all security

Security Firewalls & Filtering Forsyth County Schools Source security

Security Device registration Virus scans on log-in Source security

Security Spell out expectations for what students and teachers may and may not do. security

Connectivity A second key to a successful BYOD rollout …

Connectivity

Capacity Third for a successful BYOD rollout …

Capacity

= B.Y.O.D. Success!

References -secure-byod-friendly-network-1 -secure-byod-friendly-network-1 -prepare-your-network-byod -prepare-your-network-byod -foundation -foundation networks-blog/?Tag=wireless%20network%20solution networks-blog/?Tag=wireless%20network%20solution e.com.k12/files/ wp-k12-byod-df.pdf e.com.k12/files/ wp-k12-byod-df.pdf