Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Classroom
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

students on laptops

Security

Security, Privacy and Confidentiality: What’s the Difference?

A woman participates in a virtual call

Classroom

Online Learning Can Help Minimize Racism and Ableism In and Out of the Classroom

Ed Hudson, CISO at California State University

Security

Universities Share Lessons Learned from Ransomware Attacks

Higher Ed influencer list 2021
The 2021 Dean’s List: 30 Higher Ed IT Influencers Worth a Follow
Jun 15 2021

Here are the savviest higher education IT leaders, bloggers, podcasters and social media personalities you should follow.

Cover of the Summer 2022 issue of EdTech/Higher Education magazine

EdTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Steve Zurier

About the Author:

Steve Zurier is a freelance technology writer based in Columbia, Md.  

Follow On: Google+ Twitter

Security

Bring Shadow IT Out of the Dark

Partnerships and best practices help staff embrace the cloud without risk.

Hardware

Neurotechnology Could Lead to Thought-Controlled Devices

Data Center

Smashing Data Storage Records

Collaboration

WebRTC Helps Bring Video Conferencing to More Apps

Data Center

This College's Virtual Backup Solution Is Prepared for When Disaster Strikes

Classroom

Colleges Find Gamification Success Through Sports Influence
University Uses Software-Defined WANs to Extend LANs to the Cloud

Networking

University Uses Software-Defined WANs to Extend LANs to the Cloud

Mobility

Wireless Displays on the Horizon at Colleges

Software

Colleges Control Costs with Asset Management Software
Texas A&M University

Security

Colleges Take a Comprehensive Approach to Security

Management

Bridging the Digital Divide Through Smart Modernization
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

students on laptops

Security, Privacy and Confidentiality: What’s the Difference?

A woman participates in a virtual call

Online Learning Can Help Minimize Racism and Ableism In and Out of the Classroom

Ed Hudson, CISO at California State University

Universities Share Lessons Learned from Ransomware Attacks

Two people look at a set of computer monitors

5 Security Myths About Google Workspace for Education

Subtopics

A team of cybersecurity staffers look at a screen

Security

3 Shifts Driving the Need for Improved Incident Response in Higher Education

EdTech

Technology Solutions That Drive Education

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • EdTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • FedTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get EdTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to EdTech Magazine Browse Magazine Archives
Cover of the Summer 2022 issue of EdTech/Higher Education magazine
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061