SlideShare a Scribd company logo
1 of 19
Download to read offline
BlueSense
Networks
Accent Advanced Systems
AIRCable
Plus Location Systems; Bluecats
Estimote
Beacons, a.k.a.
Bluetooth Low Energy
(BLE) and Bluetooth
Smart: What do they
look like?
Beacons make it possible to
deliver educational content
to specific areas or learning
zones within a classroom,
enabling a new level of
personalized education.
1
Combine beacons with
apps for wayfinding
and campus tours.
Printed maps are
becoming a thing of
the past.
2
With beacons,
students can
automatically
check in at events.
3
Beacons make it possible
to provide electronic
coupons for discounts on
food and drink at specific
locations, such as dining
areas.
4
In the bookstore, use
beacons to:
•	Trigger notifications for
discounts on merchandise
or special events
•	Notify in-range students
of the current wait time for
the book buy-back line.
$
5
With beacons,
schools can
eliminate badge
readers for
granting building
access to students.
6
Beacons can be used to
set up scavenger hunts
for students, with badges
or prizes for completion.
7
Beacons can provide
information on key
landmarks, trees in
an arboretum, or
museum artwork to
create augmented
spaces or extended
classrooms, when
students use their
smartphones closeby.
8
9
Beacons can be used
to deliver electronic
agendas and meeting
materials to students
in the classroom.
With their accurate
position capabilities,
beacons can take the
burden out of tracking
class attendance.
10
Beacons can be used to
restrict device access at
locations. When a teacher
with a beacon enters the
classroom, all student
devices with Mobile Device
Management (MDM) are
restricted to textbook app
access only.
11
Beacons provide directions and
rotating special content to students
within a museum or library, replacing
signs and printed programs.
12
Mass-produced paper
programs are no longer
necessary at sporting
events, where beacons
enable virtual athletic
programs that describe
the players and activity.
13
Beacons notify campus
administrators of the
accurate locations of
students during campus
emergencies, setting a new
standard in campus safety.
14
Schools can use the
location-sensing ability
of beacons to better
understand the flow
of students and staff
throughout the campus.
This can help optimize
scheduling and campus
design, and remove
bottlenecks.
15
WWW.EXTREMENETWORKS.COM/HIGHER-ED
Special thanks to: Brian Rellinger and Bob Nilsson,
with contributions from David Soliday, Joe Peterson,
and Cheryl Pearl.

More Related Content

What's hot

Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
gbud7
 
DNS Hizmetine Yönetlik DoS/DDoS Saldırıları
DNS Hizmetine Yönetlik DoS/DDoS SaldırılarıDNS Hizmetine Yönetlik DoS/DDoS Saldırıları
DNS Hizmetine Yönetlik DoS/DDoS Saldırıları
BGA Cyber Security
 
Derinlemesine Paket İnceleme (Deep Packet Inspection)
Derinlemesine Paket İnceleme (Deep Packet Inspection)Derinlemesine Paket İnceleme (Deep Packet Inspection)
Derinlemesine Paket İnceleme (Deep Packet Inspection)
BGA Cyber Security
 
Ağ Tabanlı Saldırı Tespit Sistemleri
Ağ Tabanlı Saldırı Tespit SistemleriAğ Tabanlı Saldırı Tespit Sistemleri
Ağ Tabanlı Saldırı Tespit Sistemleri
Cihat Işık
 
Siber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoSSiber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoS
BGA Cyber Security
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
dkaya
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
Marco Morana
 

What's hot (20)

Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
DNS Hizmetine Yönetlik DoS/DDoS Saldırıları
DNS Hizmetine Yönetlik DoS/DDoS SaldırılarıDNS Hizmetine Yönetlik DoS/DDoS Saldırıları
DNS Hizmetine Yönetlik DoS/DDoS Saldırıları
 
Introduction vulnérabilité web
Introduction vulnérabilité webIntroduction vulnérabilité web
Introduction vulnérabilité web
 
Derinlemesine Paket İnceleme (Deep Packet Inspection)
Derinlemesine Paket İnceleme (Deep Packet Inspection)Derinlemesine Paket İnceleme (Deep Packet Inspection)
Derinlemesine Paket İnceleme (Deep Packet Inspection)
 
Ağ Tabanlı Saldırı Tespit Sistemleri
Ağ Tabanlı Saldırı Tespit SistemleriAğ Tabanlı Saldırı Tespit Sistemleri
Ağ Tabanlı Saldırı Tespit Sistemleri
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Siber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoSSiber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoS
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
Security misconfiguration
Security misconfigurationSecurity misconfiguration
Security misconfiguration
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSECSosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
 
해킹 대회 리뷰 및 실전 해킹
해킹 대회 리뷰 및 실전 해킹해킹 대회 리뷰 및 실전 해킹
해킹 대회 리뷰 및 실전 해킹
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI Attacks
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
 

Similar to 15 Uses of Beacons in Education

Butler- Virtual Field Trips
Butler- Virtual Field TripsButler- Virtual Field Trips
Butler- Virtual Field Trips
Allison Butler
 
Facilities Plan
Facilities PlanFacilities Plan
Facilities Plan
aander56
 

Similar to 15 Uses of Beacons in Education (15)

Library transformation plan
Library transformation planLibrary transformation plan
Library transformation plan
 
Student Voice & Choice with Library and Makerspace Centers by Collette J.
Student Voice & Choice with Library and Makerspace Centers by Collette J.Student Voice & Choice with Library and Makerspace Centers by Collette J.
Student Voice & Choice with Library and Makerspace Centers by Collette J.
 
5 Smart Ways to Use iBeacon in Education
5 Smart Ways to Use iBeacon in Education5 Smart Ways to Use iBeacon in Education
5 Smart Ways to Use iBeacon in Education
 
SCONUL Library Design Awards 2019 - Professor Nick petford
SCONUL Library Design Awards 2019 - Professor Nick petfordSCONUL Library Design Awards 2019 - Professor Nick petford
SCONUL Library Design Awards 2019 - Professor Nick petford
 
Building
Building Building
Building
 
How Location Services Transform Education
How Location Services Transform EducationHow Location Services Transform Education
How Location Services Transform Education
 
How Location Services Transform Education
How Location Services Transform EducationHow Location Services Transform Education
How Location Services Transform Education
 
Ncate accre
Ncate  accreNcate  accre
Ncate accre
 
Smart Class.docx
Smart Class.docxSmart Class.docx
Smart Class.docx
 
Digital Places: Location-based Digital Practices in Higher Education using Bl...
Digital Places: Location-based Digital Practices in Higher Education using Bl...Digital Places: Location-based Digital Practices in Higher Education using Bl...
Digital Places: Location-based Digital Practices in Higher Education using Bl...
 
Beacon technology for education - bfonics
Beacon technology for education - bfonicsBeacon technology for education - bfonics
Beacon technology for education - bfonics
 
A speculation on the possible use of badges for learning at the UK Open Unive...
A speculation on the possible use of badges for learning at the UK Open Unive...A speculation on the possible use of badges for learning at the UK Open Unive...
A speculation on the possible use of badges for learning at the UK Open Unive...
 
Butler- Virtual Field Trips
Butler- Virtual Field TripsButler- Virtual Field Trips
Butler- Virtual Field Trips
 
E-books, e-texts and e-platforms: a wicked problem for school libraries
E-books, e-texts and e-platforms: a wicked problem for school librariesE-books, e-texts and e-platforms: a wicked problem for school libraries
E-books, e-texts and e-platforms: a wicked problem for school libraries
 
Facilities Plan
Facilities PlanFacilities Plan
Facilities Plan
 

More from Vala Afshar

How Google Glass Will Change Healthcare
How Google Glass Will Change HealthcareHow Google Glass Will Change Healthcare
How Google Glass Will Change Healthcare
Vala Afshar
 
10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking
Vala Afshar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 
14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education
Vala Afshar
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in Healthcare
Vala Afshar
 
Top 100 CIOs to Follow on Twitter
Top 100 CIOs to Follow on TwitterTop 100 CIOs to Follow on Twitter
Top 100 CIOs to Follow on Twitter
Vala Afshar
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
Vala Afshar
 

More from Vala Afshar (20)

Account Based Marketing
Account Based MarketingAccount Based Marketing
Account Based Marketing
 
Six Stages of Digital Transformation (Research)
Six Stages of Digital Transformation (Research)Six Stages of Digital Transformation (Research)
Six Stages of Digital Transformation (Research)
 
10 Design Experience X-Factors
10 Design Experience X-Factors10 Design Experience X-Factors
10 Design Experience X-Factors
 
What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?
 
Top 100 Most Social K-12 Tech Leaders on Twitter 2015
Top 100 Most Social K-12 Tech Leaders on Twitter 2015Top 100 Most Social K-12 Tech Leaders on Twitter 2015
Top 100 Most Social K-12 Tech Leaders on Twitter 2015
 
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
100 Business Insights from Fortune 500, Startup CEOs, Venture Capitalists, an...
 
Super Bowl XLIX – 10 Fan Engagement Insights Provided by Purview Application ...
Super Bowl XLIX – 10 Fan Engagement Insights Provided by Purview Application ...Super Bowl XLIX – 10 Fan Engagement Insights Provided by Purview Application ...
Super Bowl XLIX – 10 Fan Engagement Insights Provided by Purview Application ...
 
100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015100 Most Social CIOs on Twitter 2015
100 Most Social CIOs on Twitter 2015
 
Ten Hottest Disruptive Technologies in Higher Education
Ten Hottest Disruptive Technologies in Higher EducationTen Hottest Disruptive Technologies in Higher Education
Ten Hottest Disruptive Technologies in Higher Education
 
How Google Glass Will Change Healthcare
How Google Glass Will Change HealthcareHow Google Glass Will Change Healthcare
How Google Glass Will Change Healthcare
 
10 Uses of Drones in Higher Education
10 Uses of Drones in Higher Education10 Uses of Drones in Higher Education
10 Uses of Drones in Higher Education
 
The Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of EducationThe Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of Education
 
A Solution to the Disengaged Workforce
A Solution to the Disengaged WorkforceA Solution to the Disengaged Workforce
A Solution to the Disengaged Workforce
 
10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking10 Reasons To Use Open Source Software-Defined Networking
10 Reasons To Use Open Source Software-Defined Networking
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in Healthcare
 
Top 100 CIOs to Follow on Twitter
Top 100 CIOs to Follow on TwitterTop 100 CIOs to Follow on Twitter
Top 100 CIOs to Follow on Twitter
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No More
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

15 Uses of Beacons in Education

  • 1.
  • 2.
  • 3. BlueSense Networks Accent Advanced Systems AIRCable Plus Location Systems; Bluecats Estimote Beacons, a.k.a. Bluetooth Low Energy (BLE) and Bluetooth Smart: What do they look like?
  • 4. Beacons make it possible to deliver educational content to specific areas or learning zones within a classroom, enabling a new level of personalized education. 1
  • 5. Combine beacons with apps for wayfinding and campus tours. Printed maps are becoming a thing of the past. 2
  • 7. Beacons make it possible to provide electronic coupons for discounts on food and drink at specific locations, such as dining areas. 4
  • 8. In the bookstore, use beacons to: • Trigger notifications for discounts on merchandise or special events • Notify in-range students of the current wait time for the book buy-back line. $ 5
  • 9. With beacons, schools can eliminate badge readers for granting building access to students. 6
  • 10. Beacons can be used to set up scavenger hunts for students, with badges or prizes for completion. 7
  • 11. Beacons can provide information on key landmarks, trees in an arboretum, or museum artwork to create augmented spaces or extended classrooms, when students use their smartphones closeby. 8
  • 12. 9 Beacons can be used to deliver electronic agendas and meeting materials to students in the classroom.
  • 13. With their accurate position capabilities, beacons can take the burden out of tracking class attendance. 10
  • 14. Beacons can be used to restrict device access at locations. When a teacher with a beacon enters the classroom, all student devices with Mobile Device Management (MDM) are restricted to textbook app access only. 11
  • 15. Beacons provide directions and rotating special content to students within a museum or library, replacing signs and printed programs. 12
  • 16. Mass-produced paper programs are no longer necessary at sporting events, where beacons enable virtual athletic programs that describe the players and activity. 13
  • 17. Beacons notify campus administrators of the accurate locations of students during campus emergencies, setting a new standard in campus safety. 14
  • 18. Schools can use the location-sensing ability of beacons to better understand the flow of students and staff throughout the campus. This can help optimize scheduling and campus design, and remove bottlenecks. 15
  • 19. WWW.EXTREMENETWORKS.COM/HIGHER-ED Special thanks to: Brian Rellinger and Bob Nilsson, with contributions from David Soliday, Joe Peterson, and Cheryl Pearl.