E-Rate Essentials: Form 471 Walkthrough
Learn and complete phase two of your E-Rate application with an E-Rate expert on hand - all from the convenience of your office or living room!
Learn and complete phase two of your E-Rate application with an E-Rate expert on hand - all from the convenience of your office or living room!
Your data backups are supposed to provide reassurance against interruptions caused by cyber attacks. But what if their next target is...your backups?
Join fellow K-12 librarians each month to discuss shared experiences, ask questions, and share ideas for supporting robust school library programs.
Join us for an open discussion on the current state of technology in our schools.
Calling all K-12 computer science and STEM educators! Join your peers from across the state each month for an informative, engagement-rich networking meeting centered on topics that matter most to you.
Curious about AI but not sure how it fits into your school? This beginner-friendly session for teachers and administrators illuminates AI's potential uses in teaching and learning + how instructional coaching can support safe, guided AI exploration for all staff.
Join fellow school administrators for an open, virtual networking series focused on exploring practical ways artificial intelligence can support your work and your teachers' success.
Join us for an open discussion on the current state of technology in our schools.
Join fellow educators to connect and collaborate on best practices for integrating instructional technology effectively into the classroom. This meeting offers a chance to share insights, troubleshoot challenges, and discover innovative tools to enhance learning experiences.
Discover how to demystifying machine learning for your upper elementary or middle school classroom using Code.org's interactive activities and lesson guidance support.
Learn and complete phase two of your E-Rate application with an E-Rate expert on hand - all from the convenience of your office or living room!
Tune in to explore why resilient K-12 defenses require both external perimeter testing (to block outside intruders) and internal testing (to simulate what happens after a credential is lost or a device is compromised).