Personalizing Learning Richard Culatta, Deputy Director
Office of Educational Technology | US Department of Education
@OfficeOfEdTech www.ED.gov/technology
The traditional teaching model treats all learners the same despite unique needs and strengths
It’s Time for a New Model
“We must take classroom learning beyond a one-size-fits-all mentality and bring it fully into the 21st century”
Technology can help…
National Ed Tech Plan
“Technology gives students opportunities for taking
ownership of their learning. Personalized learning is paced to student needs,
tailored to learning preferences, and customized
to the specific interests of different learners.”
What is Personalized Learning?
Adjusting the pace (individualized)
Adjusting the learning approach (differentiated)
Leveraging student interests/experiences
= Personalized Learning
Examples of Personalized Learning Systems that adapts to learner needs
Examples of Personalized Learning Systems that support differentiated learning
Examples of Personalized Learning Increasing the frequency of formative assessments
Examples of Personalized Learning Providing learners choice about what and how they learn
Examples of Personalized Learning Customizing instruction based on performance/preference
Examples of Personalized Learning
Approaches that turn learners into creators
Essential Elements of Personalized Learning
Essential elements
Students need their own devices/access
Computer Lab
Essential elements
Near-real-time feedback to parents/students/teachers:
Essential elements
Essential elements Ability for students to own their data
Student-managed electronic learning portfolios can be part of a persistent learning record and help students develop the self-awareness required to set their own learning goals; express their own views of their strengths, weaknesses, and achievements; and take responsibility for them.
- National Educational Technology Plan
Essential elements
Leveraging patterns from digital interactions to improve improve instruction, and fuel research:
Personalized learning is for teachers too!
Personalizing Teacher Improvement
Race to the Top - District
Education
What can you do?
Final Thoughts
Thanks!
@OfficeOfEdTech www.ED.gov/technology
25
Managing and Securing the Un-Tethered Classroom
Mike Maxwell National Director - U.S. State & Local Government and Education
Managing and Securing the Un-Tethered Classroom
Preparing for Today’s Classroom
• Threat Management & Impact of BYOD (Bring Your Own Device)
• Growth of Digital Textbooks (Access and Controlled use)
• Need for Streaming Content (Limiting Access)
• Management of Assets and Digital Content (Critical Information)
• Insuring Information Governance (Protection and Access Compliance)
Managing and Securing the Un-Tethered Classroom 26
The key to the un-tethered classroom is having the ability to effectively secure and manage your environment and everything that touches it!
Impact of BYOD (Bring Your Own Device)
27
(Mobile Devices In The Enterprise – Defining Your Journey)
Institution Owned Unmanaged Devices
• VIP • O3
Authentication & Access
Information Protection
• App Center
Institution Controls Relevant Apps & Data Only
3
• App Center • Norton Zone
App Distribution & Collaboration
• App Center • Norton Zone
App Distribution & Collaboration
• VIP • MPKI • O3
Authentication & Access
Information Protection
• DLP for Mobile
• App Center
• Mobile Management
• Mobile Security
Device Control & Management
Institution Controls Standard Device
Company Owned
• App Center • Norton Zone
App Distribution & Collaboration
• VIP • MPKI • O3
Authentication & Access
Information Protection
• DLP for Mobile
• App Center
• Mobile Management
• Mobile Security
Device Control & Management
Institution Controls Personal Device
Personally Owned 2 1
BYOD
Managing and Securing the Un-Tethered Classroom
Digital Textbook Evolution
• Policy development, management and execution around content • Licensing management • Copyright infringement • Data alterations - DLP • Storage • Streaming • Remote wipes • HA • Backup
28 Managing and Securing the Un-Tethered Classroom
Streaming Content • The curriculum
– What’s the content – Who does it need to go to – How long does the student need it – What can they do with it – How does the organization expire/retract the
curriculum
Steaming technology capabilities addresses: • Simplification of Application delivery • Reduction of software license costs
– Upgrade and patch applications quickly – Disconnected usage capability – Reduce application support costs/disruption
Managing and Securing the Un-Tethered Classroom 29
Management of Digital Content (Critical Information)
• Data Growth/Data Center Issues
• HA/DR
• Protection −Student, Faculty, Staff, Parent (Need
to quantify/classify the data to ensure right level of protections)
o(Student grades, test scores, test content)
oSocial Media oDigital Textbooks
−Who can access, where, when, how
Managing and Securing the Un-Tethered Classroom 30
Insuring Information Governance (Protection and Access Compliance)
• How does the institution show Educational compliance
• How does the institution ensure data protection and data recovery
• More than 40 states are developing next-generation accountability and support systems, guided by principles developed by the Council of Chief State School Officers – 44 states and the District of Columbia have adopted a common set of
state-developed college and career-ready standards
– 46 states and the District of Columbia are developing high-quality assessments aligned with college- and career-ready standards
Managing and Securing the Un-Tethered Classroom 31
Symantec’s Value
32
Secure Manage
Protect Deploy & Enable
Managing and Securing the Un-Tethered Classroom
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
33
Mike Maxwell
National Director, U.S. State and Local Government & Education
Symantec Corporation
D. Patches Hill
Technology Systems Manager, Indian River School
District, Del.
Richard Culatta
Deputy Director Office of Educational Technology, U.S.
Department of Education
Managing and Securing the Un-Tethered Classroom
How to Secure and Manage the Untethered Classroom
K12 Perspective
Introduction • Indian River School District (www.irsd.net)
– Located in southeastern Delaware with 1,175 staff and 8,871 students in 15 schools that covers over 360 square miles
– 15% African American, 24% Hispanic/Latino, 55 % White, 2% Asian, 1% American Indian with 64% being classified as low income
– Over 4,200 PCs and 1,500 iPads – $113 million/year state agency – Mission Statement: The Indian River School District's mission is to assure that
students attain the knowledge, skills, and attitudes needed to realize their potential, meet the challenges of their life choices, and fulfill their responsibilities as citizens of the State of Delaware, United States and world through a partnership of students, parents, staff, administrators, Board of Education and community.
Change is the key to continued success…
• How will you adapt to future initiatives such as: – BYOD – 1to1 – Digital Textbooks – Online/Blended Learning – Anytime/Anywhere Access
• Too many organizations still view IT as a cost center. Districts have to view IT as an operational efficiency that with a small investment can both save money and help you better meet the goals of the organization.
Two pieces of a complex puzzle….
Student Achievement
Learning Management
Technology Management
Etc.
“You have to map IT to the needs of the organization.”
Goals\Objectives
• Implement Industry Best Practices • Modernize District Taking Organization Well
into 21st Century • Move IT Operations from Reactive to Proactive
(Allowing for Adoption of Mobile Devices)
Key Considerations
• Modernization is not an overnight change and the evolution is continuous.
• You must have buy-in to the vision and your strategic plan.
• The organization has to be open to change, or the culture itself must change.
• Securing mobile data has changed drastically in just 2 years due to consumerization of the enterprise.
• IT governance and/or policy doesn’t mean that education becomes a second priority (we all have customers).
Challenges and Successes • Funding all areas became distributed due to timeline,
amounts needed and how funding works in public sector. • Tablets/smart phones are not PCs and aren’t managed in
the same fashion. • In 2008, only 6% of assets were mobile. At this time over
23% of our PC base is mobile, and if you add tablets it takes the district to 58%.
• The district has built a platform independent IT environment. Must do the same for learning!!!
• Cloud-based service providers can help with some security concerns depending on security level needed and assist in platform independence.
• Professional development of staff can not be forgotten.
Plans for the Future
• MDM to replace manual management and ActiveSync
• Continue to adopt other industry best practices for IT management
• Modify funding approach allowing us to better meet the needs of organization.
• Adopt more cloud-based solutions • More security/less equipment --- consolidated
data center
Key References
District Policy http://www.irsd.net/pages/Indian_River_School_District/Parents___Students/Policy_Manual State Policy and Standards http://dti.delaware.gov/information/standards-policies.shtml 7 Steps http://dti.delaware.gov/pdfs/pp/PortableWirelessNetworkAccessDevicePolicy.pdf