Skip to main content

Study: 60 percent of students won’t attend a college without Wi-Fi services

campus-wi-fi
Image used with permission by copyright holder

According to a recent study conducted by OnlineColleges.net, six out of ten students won’t consider a college unless the education institution provides access to “free” Wi-Fi services on campus. While any development and maintenance costs of a campus-wide Wi-Fi network is ultimately billed to the students through tuition costs, colleges that are behind the curve on providing Wi-Fi infrastructure may be negatively impacted by this trend. Seventy-five percent of students believe that Wi-Fi access on college campus helps them get better grades during the semester and 90 percent believe Wi-Fi is just as essential to an education as a computer or a classroom.  

Student-Laptop-campusWhen asked what was the one online resource or site that they could not live without, the most common answer was Google. Other responses included Wikipedia, Blackboard, Yahoo! and Facebook. When it came to social media, 86 percent of the respondents use a social networking site and 15 percent wished that their instructors used Facebook more often. In addition, 58 percent of students are very comfortable talking about class assignments over a social network. When asked if it was appropriate to befriend an instructor on a social network, nearly 40 percent thought that was an inappropriate action. 

Recommended Videos

When asked about the most important types of computer hardware, the most common answers included laptops, printers, desktop computers and USB drives. Other pieces of hardware that supported further education included smartphones, eReaders, tablets and MP3 players. The most popular forms of software vital to education include word processors, e-mail and presentation software like PowerPoint. In regards to college performance with technology, 43 percent believe that their college needs more technology and only 59 percent think that their college is putting good use to the available technology on hand. However, nearly a third of respondents stated that their instructor often needs help getting classroom technology to work correctly.

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more