Tablets are becoming more affordable all the time, but they're not so inexpensive that you wouldn't worry if kindergartners treated them with the same care they treat construction paper and jars of paste. Tablets are becoming more powerful, but they're not so efficient that the 400 students in the afternoon Bio 101 lecture won't all be fighting for the power outlet. Tablets can allow teachers to extend the classroom past the brick walls of the school -- but you want to make sure that, when proprietary data and student PII exit the building, they don't exit the security of the school's network.
If you're an education CIO, and you want your teachers and students to take advantage of all the things tablets can really offer, you need to provide them with tablet solutions that are secure enough to protect student data and sturdy enough to protect themselves. If those challenges sound familiar, join us Monday, April 7, at 2:00 p.m. ET (11:00 a.m. PT) for the next episode of E2 live video, "Safety in Hand: Tablet Management for Secure Mobility Solutions."
E2 Executive Editor Curt Franklin will sit down with David Fritz and Lolita Chandra from Dell to discuss the critical issues surrounding the decision to deploy tablets in your school -- like how to ensure data integrity and device management across a wide spectrum of user groups -- and how to make the most of the tablet solutions you choose. They'll discuss:
How tablets fit into the educational technology spectrum
Concrete benefits -- and legitimate concerns -- from tablet deployment in schools
Why system management is critical for tablet success
How mobility extends the campus into students' homes
Which concerns "traditional education" proponents bring to the mobility conversation -– and why it's a critical debate
How Dell's new enterprise tablets meet the needs of the secure campus
They'll also give you a peek at the Dell Venue 11 Pro, which is designed with enterprise-level encryption and integrates with a wide variety of security tools. With power efficiency, swappable batteries, and a durable design, these tablets are built to withstand the hazards of everyday student activities.
So register now and join us Monday, April 7, at 2:00 p.m. ET (11:00 a.m. PT).
@MDMConsult - One thing is for sure, the tablet isn't going away anytime soon. It's impact has nearly completely changed the game with respect to modern technology. I do feel that technologies such as google glass will eventually make just as big of an impact soon.
Yes, the continued improvements on security areas and market expansion will help prove further areas of success. The impact of disruptive technologies is expected to change mobile and emerge in growth within the next few years.
@MDM - There's no question that the tablet market isn't going anywhere. Surely it's here to stay. The interesting part has been the affect its had on security concerns. There's going to be a shift in security practices that are necessary with the BYOD and tablet market.
The Tablet Market seems to get stronger day by day. A lot of changes and adjustments to the Tablet market showed us rapid market demand. As new models occur and predictions for its use in the consumer or work space, we should expect to see more from this market in years to come.
@Anand, you make a good point about the casual use. With the prevalence of today's apps on the android and iOS platforms (not found on laptops), comes the propensity for greater malware. That alone is a security concern that makes you want to cry about. :)
@ Pedro Gonzalez, tablets are certainly not magic bullets for improving the performance of students. While they stretch the classroom to students' homes, they also work to distract the students in their classes and from their work at home. Security issues that come with casual use of tablets by students are quite self-evident.
@ Damian Romano, you are right, tablets have actually become the devices of choice. They haven't only took mobility to its peak but also tried to give you a limited PC experience for some tasks. Security situation, however, is quite different for PCs and tablets. People tend to be more casual on tablets. On the other hand PCs are thought to be serious working tools. This difference in attitude makes it necessary to view the security of both devices differently.
Re : E2 Video: Tablet Management for Secure Mobility Solutions
This console look great physically to me and it is a good creation, but I don't like the idea of floating arm, the blindfold (you call it helmet if you like). It is not easy to play in a packed room full of people which means for one to play, you must have space. I like playing group game since solo gamming is boring, but I doubt if it can be done with these VR helmets. Sony should correct on these factors then bring it back to the market.
This is a very important and I am interested in it. I think tablets are more advantageous than laptops and PCs when it comes to mobility and flexibility factors. The challenging factor here is the security problem which will be involved during the learning process. Therefore I would like to encourage E2 Executive Editor Franklin to major on questions touching on security issues.
Table management will evolve in our work and classroom environments. From any internal level within the organization we are more in depth in learning, adopting the technologies, understanding and adapting to new roles, strategies in working with these collaborative solutions.
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: email@example.com
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
Office and personal productivity tools come in a first-class and coach flavor set, but what makes the difference is primarily little things that most users won't encounter. What's the big issue in using something other than Office, and can you get around it?
We really don't want an "Internet of Everything" but even building an Internet of Everythinguseful means setting some ground rules to insure there's value in the process and that costs and risks are minimized.
Google's Chrome OS has a lot of potential value and a lot of recent press, but it still needs something to make it more than a thin client. It needs cloud integration, it needs extended APIs via web services, and it needs to suck it up and support a hard drive.
On a recent African trip I saw examples of the value of the cloud in developing nations, for educational and community development programs. We could build on this, but not only in developing economies, because these same programs are often under-supported even in first-world countries.
VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.