Calendario

Octubre 2018
LunMarMierJueVierSabDom
 << < > >>
  12345
6789101112
13141516171819
20212223242526
2728293031  

Anuncio

¿Quién está en línea?

Miembro: 0
Visitante: 1

rss Sindicación

Oct182013

Student Hacks Florida University?s Wireless Network ? Redirects Users To Porn Site To Expose Security Flaws








Springfield School District Upgrades Wireless Network with Aruba Instant Controller-less Wi-Fi Solution






Student hacks Florida universitys wireless network redirects users to porn site to expose security flaws The computer engineering student says he was simply performing a public service by pointing out system vulnerabilities. The student was arrested but the university DID upgrade its wireless network following the incident. By Christine Roberts / NEW YORK DAILY NEWS school wireless systems UK Tuesday, March 12, 2013, 2:14 PM Comment Benjamin Blouin, 26, is facing a third-degree felony charge of offenses against computer users after he hacked Florida State University Panama Citys wireless network and rerouted users to the graphic shock site, Meatspin.com. A student at Florida State University Panama City is facing felony charges after he hacked the university's wireless network and rerouted users to a porn site, he says, to expose flaws in the school's security system. Police arrested Benjamin Blouin, 26, for manipulating the school's network on March 1, forcing its users to be redirected from the university's homepage to the notorious shock site, Meatspin.com, which showed a video of two men having sex, the News Herald reported. RELATED: COLIN POWELLS FACEBOOK PAGE GETS HACKED It remains unclear how long the hack lasted or how many users were shown the graphic video, but Blouin estimates that the incident was about 30 minutes long. Blouin, a computer engineering student, said the hack was his latest attempt to notify university officials that the school's wireless network, which was previously open to the public, was not secure. RELATED: HACKER TAKES $ INFO FROM JAY-Z, HIL CLINTON, OTHERS "Anybody's identity, while they're logged onto that network, could be at risk," Blouin told the Herald. Blouin added that he did not intend to send people to the raunchy site, explaining that it was a default option on his hacking "app." RELATED: MICROSOFT, PINTEREST, TUMBLR AND TWITTER ALL HACKED Despite the arrest, Blouin's efforts weren't completely futile. Florida State University Panama City has since upgraded their wireless networks and users are now required to provide a login and password to gain access to the Internet, the school's director of advancement Becky Kelly announced in a statement.
For the original version including any supplementary images or video, visit http://www.nydailynews.com/news/national/student-hacks-school-wireless-network-redirects-users-porn-site-article-1.1286260










We felt if Instant could work in these locations, it could work anywhere, Qualls explained. The Aruba Instant access points (IAPs) performed flawlessly, providing the coverage and performance Springfield was looking for. With new devices including more iPads and Macs being added to the network every day, Springfields requirement for a solid wireless infrastructure has moved to the top of the districts priority list. The new Springfield wireless network is currently supporting about 2,400 devices in four buildings, and Springfield will continue to roll out Aruba IAPs to the rest of the district locations during the coming months. The district is also using Arubas AirWave Management System to monitor and manage the wireless network, allowing them to quickly identify and resolve network issues. Aruba Instant has become a popular choice for K-12 school districts like Springfield that must support an increasing number of mobile devices in their schools without the resources and funding to tackle those challenges, said Gerry Festa, director of industry solutions marketing for Aruba Networks.
For the original version including any supplementary images or video, visit http://www.fool.com/investing/businesswire/2013/01/15/springfield-school-district-upgrades-wireless-netw.aspx







Wireless networks in the enterprise and in schools




None

This is a move to 21st century learning where students can access information just in time, rather than just in case, he says. An issue that all schools face is the increased demand on computer rooms and simply not being able to supply computers to every single student. The wireless network and the BYOD opens computer access up, Hastie says. The school also has a learning management system, called RangiNet, which is support in the cloud for both parents and students. Via RangiNet, students can access resources, links to further information or simulations, at any time. Its heavily used both in the classroom and out of school, says Hastie. Another thing that the network and devices facilitate is electronic workbooks, which many subjects are moving towards now, he says. Traditionally, these books would be printed and handed out to students for a fee, but from next year, those with devices will be able to download the workbooks to their device. The school has also entered into a new printer and copy contract with Fuji Xerox. All students now have their own swipe card to release print jobs that are delivered over the wireless network to printers in the school.
For the original version including any supplementary images or video, visit http://www.computerworld.co.nz/article/490863/wireless_networks_enterprise_schools/




Admin · 40 vistas · Escribir un comentario
Oct092013

Cisco Completes Acquisition Of Sourcefire








Networking for networking: how Cisco uses social media marketing






The increased scrutiny on security is being driven by the evolving trends of mobility, cloud computing, and advanced targeted attacks. More than the attacks themselves, a major consideration is the change in what defines a network, which goes beyond traditional firewalls and includes data centers, endpoints, virtual and mobile to make up the extended network. A threat-centric security model lets defenders address the full attack continuum, across all attack vectors, and respond at any time, all the time. "To truly protect against all possible attack vectors, our focus is to examine the nature of modern networked environments and devices and to defend them by deeply understanding and analyzing the mindset of the attackers," said Christopher Young, senior vice president, Cisco Security Group. "Cisco's portfolio of integrated solutions support this focus by delivering unmatched visibility and continuous advanced threat protection, allowing customers to act smarter and more quickly -- before, during, and after an attack." Cisco and Sourcefire customers will benefit from Cisco's commitment to drive forward both the ASA and FirePOWER(TM) platforms. Cisco is also committed to open source innovation and will continue to support Snort(R), ClamAV(R) and other open source projects. With the completion of the transaction, Sourcefire employees join the Cisco Security Group led by Young. Additionally, Martin Roesch, founder and chief technology officer of Sourcefire, becomes vice president and chief architect for Cisco's Security Group reporting directly to Young. Under the terms of the agreement, Cisco is paying $76 per share in cash in exchange for each share of Sourcefire and assuming outstanding equity awards for an aggregate purchase price of approximately $2.7 billion, inclu ding retention-based incentives.
For the original version including any supplementary images or video, visit http://www.bloomberg.com/article/2013-10-07/aW4dN1Un3mjQ.html










This is the concept of the advisory I write called ValuTrader. At ValuEngine.com we show that 77% of all stocks are overvalued, 40.8% by 20% or more. 15 of 16 sectors are overvalued 13 by double-digit percentages, seven by more than 20%. This week there are four Dow components on this weeks ValuTrader watch list. These stocks will be added to the ValuTrader model portfolio on GTC limit orders to buy weakness to the value levels. Cisco Systems Cisco Systems : This computer and technology stock has a buy rating and is 8.9% overvalued, but is projected to gain 6.2% over the next 12 months. The stock has declined 13% since testing $26.45 on Aug. 13 and is just above its 200-day simple moving average at $22.70. Cisco is on this weeks ValuTrader Watch List with a semiannual value level at $22.76 with a monthly risky level at $25.40. General Electric General Electric : This multi-sector conglomerate stock has a buy rating and is 13.9% overvalued, but is projected to gain 7.9% over the next 12 months. GE is on this weeks ValuTrader Watch List with its Sept.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/investor/2013/10/07/return-to-value-stocks-cisco-and-three-others-to-buy/







Cisco: Don?t Fret Chambers Comments on Economy, White Box, Says Goldman




(source) width='300px' style='float:left;padding:5px' />

That said, to the extent the Federal shutdown lingers and concerns into the debt ceiling escalate, we could see Ciscos guidance being impacted not only by lower Federal demand, but also by reduced CEO confidence more broadly. If that scenario were to occur, we would still prefer Cisco to other stocks in our coverage on a relative basis, given the companys strong execution, ongoing share gains, and discount multiple, which we believe will make it a relative outperformer in an environment where most enterprise-oriented companies may be taking estimates down. Note that this is not our current view, but something we are watching closely as events in Washington, D.C. unfold over the next 2 weeks. Jankowski also refers specifically to another article I wrote the same day , in which Chambers frankly admits that the company faces threats from white box vendors of networking an admission that she thinks is a good thing, and nothing that should worry investors overly much: Investors also cited Mr. Chambers comments in a Barrons interview on September 26 that IT as a service and white label will be our biggest competitors three to five years out, citing Amazon as an example of a competitor with 5% margins vs. Ciscos 65%. We dont view these comments as anything new, and in fact we view Ciscos accurate assessment of the competitive landscape as positive as it implies the company is investing in the right direction, rather than hiding form or denying industry trends.
For the original version including any supplementary images or video, visit http://blogs.barrons.com/techtraderdaily/2013/10/07/cisco-dont-fret-chambers-comments-on-economy-white-box-says-goldman/







Return To Value Stocks: Cisco And Three Others To Buy






On a worldwide basis, around 80 percent of Cisco's annual revenues come through indirect channel sales. "That makes it vital for us to keep channel partners up-to-date on our latest demand generation campaigns, our PR activities and our branding strategies, so that they stay informed on what we say about ourselves as a company and, perhaps more importantly, give us vital feedback on how those messages are playing out in the market." Cisco keeps in mind the role that employees from outside of its marketing function play in broadcasting these messages. At the time of writing, for example, the company's chief technology and strategy officer Padmasree Warrior has almost 1.5 million followers on Twitter. Its chief futurist David Evans, meanwhile, is connected with over 67,000 people on LinkedIn. "As social media continues to break down the barriers between personal and professional lives, more and more of our employees have a role to play here," says Nixon. "We don't seek to limit them or prohibit them in any way, but we do issue clear guidelines and training, so that they understand their responsibilities to the company in social media." Anyone at Cisco who uses social media for work purposes must complete the company's Social Media Training and Certification programme and its social media policy is integrated into its Code of Business Conduct and new hire processes. According to Nixon, her UK and Ireland team have scored several notable successes on social media over the last year or so, including a 2012 post-Olympics Twitter chat with David Evans (@davethefuturist), as well as social media activities around the company's January 2013 Cisco Live event. These, she says, enabled conversations about the new innovations presented at this education and training event for IT professionals to go "deeper and wider", reaching more people. Looking forward, the marketer's job will be to learn from these types of engagement and adapt social media marketing activities in response, says Nixon.
For the original version including any supplementary images or video, visit http://www.theguardian.com/technology/2013/oct/09/networking-for-networking-how-cisco-uses-social-media-marketing




Admin · 40 vistas · Escribir un comentario
Oct032013

Us Military Judge Denies Bid To Pause 9/11 Case At Guantanamo Over Network Security Fears








Creating a security management model for critical infrastructure






Photos of the day Indigenous lands protest in Brazil, Gandhis birthday, U.S. government shutdown and more. The defendants are facing trial by military commission at the U.S. base in Cuba on charges that include nearly 3,000 counts of murder, terrorism and hijacking for their alleged roles planning and aiding the worst terror attack on U.S. soil. They face the death penalty if convicted. Pohl heard three days of testimony in August at Guantanamo about security fears that prompted defense lawyers to stop using government email and servers for confidential legal work. Lawyers said data disappeared, emails went astray or were improperly sent to the prosecution, and private legal research was subject to monitoring. Prosecutors said the concerns were overblown, but Defense Department officials agreed to address the complaints in the coming weeks. James http://www.iccup.com/content/blogs/Looking_into_Dedicated_Servers.html Connell, a lawyer for defendant Ammar al-Baluchi, said the main issues have not been resolved and the defense teams are still using external hard drives and personal email for sensitive case work.
For the original version including any supplementary images or video, visit http://www.washingtonpost.com/national/us-military-judge-denies-bid-to-pause-911-case-at-guantanamo-over-network-security-fears/2013/10/01/46905280-2ad8-11e3-b141-298f46539716_story.html







Tenable Network Security Receives Highest Rating Possible in 2013 Gartner Marketscope Report






In terms of these relationships you can see that managing security requires not only the thinking about technical aspects of connected systems, protocols, software, or hardware but business organizational aspects as well. It requires a seamless integration of business policies, operations, and information systems platforms into the management areas. Contrast of business operations Thinking about the definition of network as mentioned above, Sector C [External, Proprietary, Perimeterisied] and Sector D [Internal, Open, De-Perimeterised] provide another contrast in relation to supply chain management. In many cases this relationship also exhibits a divide in respect to critical infrastructure. Large scale users of embedded systems networks (i.e., utility, pipeline companies) must maintain multiple vendor sources for products. They do not want to be stuck in a situation where a single vendor does not have the capability to supply their needs or worse, goes out of business and network owners can no longer get the products. To further explain, a proprietary equipment supplier can have well managed supply chains but when the products from multiple vendors are brought internal to a large infrastructure company each vendor has a different method of product and network management. Since they all use open protocols and network standards they are all interchangeable on the surface but once installed there is little accountability to the sourcing or internal disposition of systems in use. Supply chain management area deals with bringing product vendors as well as products themselves together with the management plan for the entire organization structure. Further linking of management areas would seamlessly integrate Secrets Management across supply channels and multiple vendors. Contrast of policies and social engineering The relation between Quadrant E [Internal, Open, Perimeterisied] and Quadrant F [External, Proprietary, De-Perimeterised] shows yet another contrast which can also be detrimental to critical infrastructure.
For the original version including any supplementary images or video, visit http://www.fiercesmartgrid.com/story/creating-security-management-model-critical-infrastructure/2013-10-02








A Pataxo Indian takes part in the first day of  the National Indigenous Mobilization protest in Brasilia, Brazil, Tuesday, Oct. 1, 2013. The protest is against a proposed constitutional amendment known as PEC 215, which amends the rules for demarcation of indigenous lands. (AP Photo/Eraldo Peres)

We wish to caution readers that a number of important factors could cause actual results to differ materially from those in the forward-looking statements. These factors include the possibility that we may not realize the anticipated benefits from the acquisition of Endace on a timely basis or at all, and may be unable to integrate the technology, operations and personnel of Endace into our existing operations in a timely and efficient manner. In addition, intellectual property claims, with or without merit, that could result in costly litigation, cause product shipment delays, require us to indemnify customers, or require us to enter into royalty or licensing agreements, which may or may not be available. Furthermore, we have in the past obtained, and may be required in the future to obtain, licenses of technology owned by other parties. We cannot be certain that the necessary licenses will be available or that they can be obtained on commercially reasonable terms. If we were to fail to obtain such royalty or licensing agreements in a timely manner and on reasonable terms, our business, results of operations and financial condition could be materially adversely affected. Ongoing lawsuits, such as the action brought by Broadcom Corporation (Broadcom), present inherent risks, any of which could have a material adverse effect on our business, financial condition, or results of operations. Such potential risks include continuing expenses of litigation, loss of patent rights, monetary damages, injunctions against the sale of products incorporating the technology in question, counterclaims, attorneys' fees, incremental costs associated with product or component redesigns, liabilities to customers under reimbursement agreements or contractual indemnification provisions, and diversion of management's attention from other business matters. With respect to the continuing Broadcom litigation, such potential risks also include the adequacy of any sunset period to make design changes, the ability to implement any design changes, the availability of customer resources to complete any re-qualification or re-testing that may be needed, the ability to maintain favorable working relationships with Emulex suppliers of serializer/deserializer (SerDes) modules, and the ability to obtain a settlement which does not put us at a competitive disadvantage. In addition, the fact that the economy generally, and the technology and storage market segments specifically, have been in a state of uncertainty makes it difficult to determine if past experience is a good guide to the future and makes it impossible to determine if markets will grow or shrink in the short term.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/emulex-introduces-high-performance-netflow-130000181.html







Emulex Introduces High Performance NetFlow Generator Appliance for Enterprise, Cloud, Security and Mobile Deployments






Over the last few years vulnerability management has risen in priority as confirmed by the first four controls in the SANS 20 Critical Security Controls. To view the full report, please visit For information on Tenable Network Security products and solutions, please visit www.tenable.com . Gartner, Inc., MarketScope for Vulnerability Assessment, Kelly M. Kavanagh, September 9, 2013. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About Tenable Network Security Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the worlds largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements.
For the original version including any supplementary images or video, visit http://us.generation-nt.com/tenable-network-security-receives-highest-rating-possible-2013-press-4334162.html




Admin · 35 vistas · Escribir un comentario
Sep282013

Openvms, R.i.p. 1977-2020?











It runs mission-critical systems and because of its consistent performance it tends to get little attention, except from a dedicated user community. One consultant, who didn't want to be identified for fear of jeopardizing existing relationships, said porting OpenVMS systems to another platform will entail much work. The OpenVMS operating system provides a lot of the capabilities that other operating systems either don't have, or don't do in a similar enough manner, said the consultant. "You typically end up re-architecting the whole thing, which can take several years for a large and complex set of applications." End-of-life decisions are likely to trigger push-back from users, consultants and anyone involved in support and operations. HP's decision to end support for the HP 3000 more than a decade ago caused quite a stir and prompted users to organize an effort to keep the system operational. Stephen De Dalto, OpenVMS consultant, said: "It's been a slow, but definite, migration from VMS, because customers have to continue to justify the OS since the higher-ups keep saying, 'Move to Linux or Windows or Unix,' without knowing the consequences of such a move." De Dalto said he was shocked by HP's decision because he would have expected HP to continue to 3G bonded networks UK develop and move to the latest Itanium chips. "It's a bad decision, because not moving forward to the latest and greatest is the same as moving backwards -- and no one wants to move backwards," said De Dalto. This article, " OpenVMS, R.I.P. 1977-2020? ," was originally published on Computerworld.com .
For the original version including any supplementary images or video, visit http://www.computerworld.com/s/article/9239984/OpenVMS_R.I.P._1977_2020_







United Vacations launches VAX system for UK






United Vacations launches VAX system for UK By Travolution Comments United Airlines holiday brand United Vacations has launched its first UK trade-only website in a move to give travel agents control over bookings and commission levels. The site Uvagents.co.uk and known as Vax Vacation Access will allow agents to book flights, accommodation, car hire and sightseeing tours across North America. It has been developed by US technology firm Trisept Solutions , a sister company of United Vacations that powers a string of major tour operator engines for the US. Targeting the trade in the UK will give United Vacations an in-road into the busy North American market and allow agents to tap into the companys so-called virtual brochures and its range of flight schedules to London Heathrow with BMI . United Vacations VAX is way ahead of the old Viewdata systems, still used by mass-market operators, the company said. Among its innovations, VAX empowers agents to set (and modify) their commission levels. They can vary both the total selling price and their own percentage, giving them that vital edge over their competitors. The VAX system will also include a multi-booking and dynamic packaging function across its portfolio of 200 North American destinations, alongside the Ski Freedom adventure holiday package deals.
For the original version including any supplementary images or video, visit http://www.travolution.co.uk/articles/2006/03/15/171/




Admin · 47 vistas · Escribir un comentario
Sep242013

Fearns Community Sports College Deploys Xirrus Wi-fi Network








Springfield School District Upgrades Wireless Network with Aruba Instant Controller-less Wi-Fi Solution






The new Wi-Fi network enables us to provide a fantastic experience for students, providing them with access to the information and content they need to excel, while future-proofing the college for further expansion and new capabilities, such as BYOD." Xirrus provided Fearns with a fully managed Wi-Fi network with no single point of failure. The college uses the Xirrus Management System (XMS) to manage various aspects of the network, such as monitoring usage levels and controlling which devices connect to the network. "Like most schools and colleges, we don't have a big IT team, so we needed a system that is easy to manage and control," said Brown. "This is especially important when you are moving away from a familiar Windows network. Thanks to Xirrus' management software, it's easy for our IT team to administer the network, monitor performance, control access and set up a dedicated VLAN for students. We also know that we can take advantage of Xirrus' Application Control capabilities when we begin to add specialised school apps that need performance guarantees." "We were very impressed with Xirrus' approach to the whole project, from the initial consultancy to the final delivery. They never pushed us towards the most expensive technology, sites but instead took the time to listen to our needs.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/-fearns-community-sports-college-deploys-xirrus-wi-fi-/2013/09/24/7431735.htm







Springfield School District Upgrades Wireless Network to 802.11n






The district found that its previous wireless network could not handle the increased number of mobile devices and other wireless equipment being used in classrooms for teaching and learning. According to Brent Qualls, manager of data and information systems for Springfield School District, the district plans to roll out a 1:1 iPad program in its three high schools, which makes wireless network reliability even more critical. The district evaluated several wireless technology providers, including Cisco , HP , Meru , and Meraki , but ultimately decided to go with Aruba Instant from Aruba Networks . According to information on the company's site, Aruba Instant is designed for Wi-Fi networks that are distributed across multiple sites, and it uses dynamic access point (AP) election, where one of the APs is dynamically elected to manage the other APs. Springfield School District 186 operates three high schools, seven middle schools, 24 elementary schools, a charter school, an adult education center, a technology center, and business and administrative offices. The school district has already completed the rollout in four of its buildings, where it is supporting about 2,400 devices. In the next few months, the district will continue rolling out the Aruba Instant wireless access points in its other locations. When the deployment is complete, the district will have 1,200 Aruba Instant wireless access points. "With our old network, we were experiencing connection issues on a daily basis, but in the buildings where we've now deployed Aruba Instant, our wireless issues have disappeared," said Qualls in a prepared statement. The district is also using Aruba's AirWave Network Management System to monitor and manage the network.
For the original version including any supplementary images or video, visit http://thejournal.com/articles/2013/01/15/springfield-school-district-upgrades-wireless-network-to-802.11n.aspx








Image Caption

Springfield School District Upgrades Wireless Network with Aruba Instant Controller-less Wi-Fi Solution By Business Wire January 15, 2013 | Comments (0) Springfield School District Upgrades Wireless Network with Aruba Instant Controller-less Wi-Fi Solution Reliable, Low Cost Wireless LAN Accommodates Increasing Use of Mobile Devices SUNNYVALE, Calif.--( BUSINESS WIRE )-- Aruba Networks, Inc. (Nasdaq: ARUN ) , a leading provider of next-generation network access solutions for the mobile enterprise, today announced that Springfield School District 186, a K-12 district comprised of 39 locations in Springfield, Illinois, is in the process of deploying Aruba Instant, Arubas controller-less Wi-Fi solution, to upgrade its wireless network. When complete, the deployment will utilize 1,200 Aruba Instant IAP-105 access points along with the Aruba AirWave Management System, to deliver a high-performing, 802.11n wireless LAN for the entire district. Springfield School District is comprised of three high schools, seven middle schools, 24 elementary schools, a charter school, an adult education center, a technology center and business and administrative offices. Although Springfield had previously deployed a wireless network to serve the district, the pre-802.11n network was not reliable or high-performing enough to accommodate the influx of mobile devices and equipment being used in classrooms. Springfield evaluated a number of wireless vendors including Cisco, HP, Meru and Meraki, but ultimately chose Aruba Instant for its low cost, ease of management and reliability. Our teachers and students have become increasingly dependent upon the wireless network for teaching and learning, and with the 1:1 iPad initiative we plan to roll out in the high schools, having a reliable infrastructure is even more critical, said Brent Qualls, manager of data and information systems for Springfield School District. He added, The wireless just has to work, because we dont have the resources to troubleshoot and fix network problems. With our old network, we were experiencing connection issues on a daily basis, but in the buildings where weve now deployed Aruba Instant, our wireless issues have disappeared. To test Aruba Instants reliability, Springfield began its deployment in the most challenging locations in its district: three high schools, one of which was built in the 1900s and contained thick, brick and mortar walls, and all of which had experienced problems. We felt if Instant could work in these locations, it could work anywhere, Qualls explained. The Aruba Instant access points (IAPs) performed flawlessly, providing the coverage and performance Springfield was looking for.
For the original version including any supplementary images or video, visit http://www.fool.com/investing/businesswire/2013/01/15/springfield-school-district-upgrades-wireless-netw.aspx







Wireless networks in the enterprise and in schools




None

The school has also entered into a new printer and copy contract with Fuji Xerox. All students now have their own swipe card to release print jobs that are delivered over the wireless network to printers in the school. Students have a credit on the card, provided by the school, but once that is gone, they have to pay for their printing themselves, which has led to less waste and more thought before printing, Hastie says. Rangitoto College is now allowing staff time to experiment a bit more before taking further steps to make student laptops mandatory, he says. The big benefit of the wireless network and using computers in the classroom is increased student engagement, says Hastie. Challenges include for staff to accept the devices into the classroom, and to create differentiating classes for those who have devices and those who dont. The school hasnt noticed any increases in cyber-bullying since allowing students own devices. Thats not to say its not happening but weve got strong policies around bullying throughout the school and procedures in place to deal with it when it occurs, says Hastie. Whilst its always an issue in any school, its not a major. Rangitoto College has a fairly open policy in terms of filtering and initially allowed students access to Facebook, but that has now been stopped for two reasons Facebook traffic was taking up too much bandwidth, and also to give students a break from the addictive nature of Facebook, says Hastie. Traffic volumes are roughly 75GB a day, with Youtube being one of the top bandwidth users, says the schools IT manager, Wayne Everett. There are 130 access points around the school, with a capacity of 60-90 clients each, he says.
For the original version including any supplementary images or video, visit http://www.computerworld.co.nz/article/490863/wireless_networks_enterprise_schools/




Admin · 39 vistas · Escribir un comentario

Página precedente  1, 2, 3, 4, 5, 6, 7  Página siguiente