{"id":708,"date":"2016-03-16T01:21:01","date_gmt":"2016-03-16T08:21:01","guid":{"rendered":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/?page_id=708"},"modified":"2016-03-27T15:29:14","modified_gmt":"2016-03-27T22:29:14","slug":"troubleshooting-guide","status":"publish","type":"page","link":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/troubleshooting-guide\/","title":{"rendered":"Troubleshooting"},"content":{"rendered":"<div style=\"text-align: justify;\"><span style=\"color: #000000;\">While implementing BYOD might seem like an extremely tempting option, the implementation life cycle is not without its share of troubles and challenges. Here are a few suggestions regarding the ways and means for\u00a0dealing with challenges.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a01. <strong>Controlling<\/strong> <strong>Multiple Devices<\/strong><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">Jim Frey talks about how IT support could look when\u00a0handling multiple devices. Though the talk is more in relation to\u00a0corporate set ups, the issues with BYOD in companies and in schools are the same.<\/span><\/div>\n<div><\/div>\n<p><iframe loading=\"lazy\" title=\"BYOD: Challenges and Best Practices\" width=\"604\" height=\"340\" src=\"https:\/\/www.youtube.com\/embed\/KHTz8wj4Z20?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<div><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">2. <strong>Network and Data Security<\/strong><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p><span style=\"color: #000000;\">When students bring in a device from home, they can choose to connect to one of two wireless networks, the main district network or a separate guest network. The guest network is an open network, but the speed is throttled, and it&#8217;s heavily filtered. If students try to connect to the main network, they should be asked for their user name and password. Once students are authenticated on the network, their Internet access is filtered according to the rules established for their group profile.<\/span><\/p>\n<p><span style=\"color: #000000;\">3. <strong>Catering content to multiple devices<\/strong><\/span><\/p>\n<\/div>\n<div>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Teachers should be encouraged to use Device-Agnostic Software. Using browser-based software can address these concerns. With tools such as <a style=\"color: #000000;\" href=\"https:\/\/www.google.com\/edu\/products\/productivity-tools\/\">Google Apps for Education<\/a>, students and teachers can access the same files as long as they are using a device with a Web browser.<\/span><\/p>\n<\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">4.\u00a0<strong>Sharing screens for Presentations<\/strong><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">Presentations in a BYOD classroom can be challenging, especially when teachers want to display a student&#8217;s screen for the class. Teachers can have students upload their work to Google Drive and then present it from their own device. There are also wireless presentation and collaboration systems available for use.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">5.\u00a0<strong>Recharging Batteries<\/strong><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">The batteries in students&#8217; devices might not stay charged for the entire school day, so schools should do their best to provide charging options. Typically the library can be transformed into a learning commons and it can have a place for students to charge their devices.Teachers could also have docking stations in the back of their classroom to let students recharge their devices.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #ffffff;\">_<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">6.<strong> Handling mobile devices<\/strong><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0<\/span><\/div>\n<div>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">School districts and other organizations are using Client Management software to manage laptop and desktop PCs. However, devices like tablets and smart phones are usually not manageable by Client Management software. Separate software is required to control and provision these devices on a network. They are called Enterprise Mobility Management (EMM)<\/span><\/p>\n<\/div>\n<p><iframe loading=\"lazy\" style=\"padding: 0; margin: 0; border: none;\" src=\"\/\/padlet.com\/embed\/tdmeyqjqgpf7\" width=\"100%\" height=\"480px\" frameborder=\"0\"><\/iframe><\/p>\n<p><a style=\"color: #41555f; text-decoration: none;\" href=\"http:\/\/padlet.com\">Created with Padlet<img decoding=\"async\" style=\"margin: 0 0 0 10px; padding: 0; border: none; width: 16px; height: 16px;\" src=\"http:\/\/padlet.com\/favicon.ico\" alt=\"\" \/><\/a><\/p>\n<div style=\"border-top: 2px solid #a7d23a; padding: 8px; margin: 0; font-size: 12px; text-align: right;\"><a href=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/evaluation-of-policy\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1268\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture103.png\" alt=\"Picture103\" width=\"150\" height=\"113\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture103.png 354w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture103-300x225.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a href=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/troubleshooting-guide\/fundraising\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1434\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture113.png\" alt=\"Picture113\" width=\"150\" height=\"109\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture113.png 366w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture113-300x218.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>While implementing BYOD might seem like an extremely tempting option, the implementation life cycle is not without its share of troubles and challenges. Here are a few suggestions regarding the ways and means for\u00a0dealing with challenges. \u00a0 \u00a01. Controlling Multiple Devices \u00a0 Jim Frey talks about how IT support could look when\u00a0handling multiple devices. Though [&hellip;]<\/p>\n","protected":false},"author":28824,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-708","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/users\/28824"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/comments?post=708"}],"version-history":[{"count":36,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/708\/revisions"}],"predecessor-version":[{"id":1886,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/708\/revisions\/1886"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/media?parent=708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}