You are here

Feature

Feature for District CIO

Charging and storage solutions are selected not just for their main functions, but also to maximize instruction time. Here are innovative solutions from district technology officials and vendors.

Providers respond: “What are some common misconceptions schools have when purchasing charging and storage platforms? How can K12 leaders plan to make the right purchase for their district?”

Charging and storage capabilities: Alabama, California, Pennsylvania and Texas districts at a glance

The challenge for Grapevine-Colleyville ISD in Texas was to make it easier for students to have their devices repaired at school.

When securing edtech infrastructure, district leaders must concentrate on six layers of security—physical, network, applications, content, endpoint and cloud/data centers—to build a comprehensive defense against increasing and evolving cyberattacks.

District CIOs recommend following the Cybersecurity Framework created by the National Institute of Standards and Technology, or NIST. The model recommends five functions to address cybersecurity threats.

Districts should develop a strategy for network, application, content, endpoint, cloud/data center, and physical security, according to a Council of the Great City Schools report.

The “Cyber-Security in Today’s K-12 Environment” report from the Council of the Great City Schools outlines six areas of security. Districts should develop a strategy for each one.

Districts moving aggressively into personalized learning covet IT leaders who not only understand instruction, but who also have the technology chops to make decisions about devices and networks.

Find out more about certifications programs for campus tech leaders, their team and district educators:

Canyons School District: https://etc.canyonsdistrict.org/etc/index.cfm

CoSN Certified Educational Technology Leader (CETL): https://cosn.org/certification

School districts will likely deal with network failures or breaches. To recover effectively, district technology professionals can respond with the following strategies.

Pages