Case study

Priming Glasgow’s Students with LEGO® Education

Case study

NComputing MSP story – m8IT

Case study

Ignite a passion for STEM with LEGO® Education at UTC Portsmouth

Case study

Supporting digital equity at Aston Universtiy

Case study

Using LEGO® Education to create practical programming at the University of South Wales

Case study

Using LEGO® Education for STEM outreach and engagement at Kingston University

Guide

LEGO® Education solutions for Higher Education

White paper

Sustainable IT in education – Acer Sustainability Research

Guide

Google for Education sustainability features

Jason Tye

Building blocks for the future with Getech and Jackson

During the recent Flood & Coast 2023 event at the Telford international centre, our intrepid man on the ground, Jason was interviewed for the Show Report Magazine.  Understanding the need to get young minds fully engaged with the STEM-related opportunities that lie ahead, Getech (working alongside civil engineering firm Jackson at the show) was demonstrating its range of tools aimed at school children, including its work with the LEGO  Education and the Scratch coding language.  “We’re designing programs that allow educators to engage with children, both to promote STEM subjects, but also to help them understand what civil engineering is” Said Jason Tye of Getech. “We want children to be excited about wanting to be the engineers of the future” – Getech 

Read More »
Google Classroom Practice Sets

Power student potential with Practice Sets from Google

With practice sets, teachers can leverage their existing content or create a wide variety of interactive assignments from scratch to provide more engaging work that students can enjoy, all inside Google Classroom. Students get immediate feedback when they answer questions thanks to auto-grading, and teachers can spend less time reviewing progress with automated insights and reports.

Read More »
Lenovo Laptops

Laptop Buying Guide for Universities

Choosing which laptop to buy depends on how you’ll be using it. For learning from home to campus life, portability is key. Something light enough to carry from the kitchen to the lecture theatre.  Power is important too – video editing needs different laptop specs to essay writing. Our buying guide will help you to decide what laptop you should buy. What size laptop do I need? Size is an important factor in deciding which laptop you should buy. The size of a laptop is defined by its screen size and its design. How large a screen you need depends on where you plan to use the laptop. If the device is going to sit on a desk in your study for the majority of the time, you can indulge in a larger display with a higher resolution.  Up to 14-inch Smaller laptops are designed for life on the move. The narrower design can be easily slipped into a satchel-type bag. 16-inch The average laptop size. Combines portable design with a wider screen, so you can multi-task whether on the go or learning from home. 17-inch The biggest laptops. Large screens are ideal for creative projects or spreadsheets. Can also get more on the screen for multitasking. What power processor do I need? Your laptop’s processor is like its brain. It decides whether the laptop can run complex software, like video editing and design programs, and how well your laptop can multitask (run several applications at once).  For basic home use — checking emails, scrolling through Twitter, watching dog videos on YouTube — a dual-core processor offers plenty of processing power. For more intensive tasks such as video editing and gaming, choosing a CPU with four or more cores will improve performance and reduce stuttering. What Storage do I need? Laptop storage is all about how much stuff it can store. This includes photos, music and video, but also documents, software and programs – for example, Word or Photoshop. Storage amount is measured in gigabytes, better known as GB, with everything stored inside a hard drive. There are two main options for laptop storage. The one you choose depends on what you need to store and how quickly you want to work. HDD (hard disk drive) Traditional hard drives offer huge storage capacities. The downsides? Slow and noisy to run. Chunky designs made up of moving parts mean they’re suited to larger laptops. SSD (solid-state drive) A solid-state hard drive loads much faster and is almost silent. They offer more compact designs, perfect for thin laptops. The downside? Smaller storage capacities and higher cost. With the advent of online streaming, cloud-based storage and better hard drive space management tools, the average user doesn’t need to worry so much about local storage limits. What memory do I need? Memory, or RAM, determines how many tasks your laptop can handle at the same time. If you regularly work with very large documents, editing files that are multiple gigabytes in size for example, RAM will give your laptop the headroom it needs to keep things from grinding to a halt. The more RAM you have, the faster your laptop will operate – retrieving, opening and running applications. Programs, sites and documents you use regularly will always be in easy reach. Experts recommend 8GB RAM as a minimum. But some laptops have as much as 16GB. Looking for a new Laptop? Getech can help you with your device solutions through our position on the NDNA framework Learn more >

Read More »

5 ways Chrome keeps your users (and your business) secure

Organisations are spending big to improve their security with products that claim to fend off hacks and eliminate vulnerability, spending up to 13% of their overall IT budget according to a study by Gartner, and that was five years ago. Since then, the number of breaches has continued to rise, with over two-thirds of business leaders experiencing an increase in cyberattacks in 2019. Phishing scams, DDoS attacks, and malware cost organisations billions due to data breaches and ransomware. Even the NHS isn’t immune, with the WannaCry attack costing our health service some £92 million in 2017. However, it’s not all down to opportunists getting past expensive third-party antivirus software – 95% of breaches are caused by human error. With working from home continuing to be a target for cyber-criminals, it’s now more vital than ever for businesses to invest in the technology that will keep their users, their data and their revenues protected from online threats. What are we used to? A bloated and flawed operating system running software that requires extemporary and disruptive manual updates Gigabytes of locally stored intellectual property, personally identifiable information, and user credentials Third-party antivirus definitions with separate billing and renewal cycles Devices built using a mish-mash of components are prone to conflicts and issues that need direct user intervention to keep patched over time Poorly enforced boundaries between system processes can allow hackers total access to a device through a single compromised module What does this mean? Working from home creates new problems as tools and processes designed for corporate networks become less and less effective Ops teams that struggle with enforcing consistent device images and patching firmware and apps across distributed endpoints IT admins are forced to focus on monitoring devices to identify vulnerabilities and detect compromises Businesses have an opportunity to make game-changing improvements in endpoint security and administration by capitalising on the inherent advantages of cloud-based architectures. Admins are able to manage their entire IT estate remotely from a central cloud-based console, and processes can be streamlined or wholly automated, allowing them to focus on proactive improvements rather than reactive maintenance. Chromebooks and other Chrome OS devices have been designed from the ground up to solve many of these issues for organisations of all sizes. Below are just some of the ways Google makes it easy for administrators to keep their endpoints secure and their users safe when working online from anywhere. 1. Automatic updates Keeping your firmware and software up-to-date can be an arduous task, which is exacerbated further when dealing with a distributed workforce. Even when vulnerabilities are announced or new attack techniques are discovered, your users often dismiss your best efforts to keep them safe and their data secure. Chrome devices benefit from automatic updates, which can be controlled remotely from the Google Admin console. These occur every six weeks – far more often than other major operating systems. Updates happen in the background and automatically take effect the next time the device is booted, minimising disruption and allowing your staff to keep working as normal. 2. Verified boot When a Chromebook boots up, the read-only OS checks itself against a known safe version using a signature and a signed hash to verify that the version being loaded exactly matches the image approved by Google. The now-verified firmware then uses the same process to check all the blocks of code in the operating system and Chrome browser to ensure there are no discrepancies. If any evidence of tampering or malware is found, the process stops and the device reboots using a backup version of Chrome OS. As it’s impossible to boot corrupted firmware on a Chromebook, Ops staff can avoid the tedious work required to remedy compromised software and files on the machine. 3. Sandboxing Several classes of cyber attacks use compromised websites and applications to take control of software components on the device, so Chromebooks utilise process sandboxing to enforce boundaries between applications in use. As apps on a Chrome device cannot communicate with each other (except under strict conditions), should your user unwittingly visit an infected website or side-load some unauthorised software, there’s no chance of it tainting anything else on the device. Simply close the app or page and the threat is swiftly neutralised and removed from the device. 4. Google Admin console When coupled with a Chrome Enterprise or Education Upgrade, businesses can unlock the Google Admin console and over 300 policies and settings they can tailor to the needs of their users and their organisation. Once the domain has been verified, IT admins are able to manage their Chrome estate from anywhere by visiting admin.google.com. Policies such as Forced re-enrolment and Restricted sign-in mean that if the worst happens and one of your Chromebooks gets lost or stolen, the device cannot be taken out of managed status and your user and customer data remains secure. Considering such data breaches cost significant time, money and damage to reputation, Google’s automated “set-and-forget” processes can prove invaluable. 5. Cloud infrastructure From the six layers of on-site security, including thermal cameras and iris scanning, to the data centre floors where less than 1% of Googlers ever get to visit, the infrastructure behind Google Cloud adheres to over 40 global data security standards and regulations. How does that compare to your traditional on-premises server room? Google custom designs and builds almost every part of the stack with a relentless focus on continual improvement and constant innovation. Cooling is one of the biggest overheads for any data centre, which is a hot topic for any organisation focused on sustainability. Google’s data centre in Finland, for example, is 100% cooled by seawater. Want to know more?Getech is one of the largest suppliers of Chrome devices and management licences in the UK. We support channel partners by providing their customers with cloud-ready technology that helps them scale quickly, work efficiently and save money.team@getechenterprise.com

Read More »