Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Classroom
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

2022 Influencers

Management

30 Higher Education IT Influencers to Follow in 2022

students on laptops

Security

Security, Privacy and Confidentiality: What’s the Difference?

A woman participates in a virtual call

Classroom

Online Learning Can Help Minimize Racism and Ableism In and Out of the Classroom

2022 Influencers
30 Higher Education IT Influencers to Follow in 2022
Jun 27 2022

Keep these higher education IT leaders, bloggers, podcasters and social media personalities on your radar.

Cover of the Summer 2022 issue of EdTech/Higher Education magazine

EdTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Tom Jordan

Tom Jordan
About the Author:

Tom Jordan is a solutions architect at the University of Wisconsin–Madison.

Follow On:
security architecture

Security

How to Design a Security Architecture

Having a cohesive security architecture is vital to ensuring a holistic approach to cybersecurity.

CCoE

Cloud

How and Why to Establish a Cloud Center of Excellence
zero trust

Security

To Prevent Ransomware Attacks, Understand the Zero-Trust Model
4 Signs That You Should Say Goodbye to Legacy Technology

Management

4 Signs That You Should Say Goodbye to Legacy Technology
Adobe Sign

Digital Workspace

Review: Adobe Sign Cuts Costs and Improves Workflow
Cisco Meraki Z3

Networking

Review: Cisco Meraki Z3 Grants Teleworking Wishes
HP Z book

Hardware

Review: Latest HP ZBook Pairs Performance and Portability
Acer S1385WHne DLP Projector

Hardware

Product Review: Acer S1385WHne DLP Projector Lights Up Class
Epson PowerLite 1985WU

Classroom

Review: Epson PowerLite LCD Projector Brightens Classrooms

Hardware

Product Review: Lenovo's Hybrid Tablet Takes On All Tasks
Google Nexus

Networking

Review: Google Nexus 7 Tablet Is Affordable and High-Quality

aaa 1

Register

Advertisement

Trending Now

2022 Influencers

30 Higher Education IT Influencers to Follow in 2022

students on laptops

Security, Privacy and Confidentiality: What’s the Difference?

A woman participates in a virtual call

Online Learning Can Help Minimize Racism and Ableism In and Out of the Classroom

A group of people work at a computer lab

College, Nonprofit Help Build Digital Literacy for Property Service Workers

Subtopics

A group of women in a higher ed learning environment

Classroom

What Is Adaptive Learning and How Can You Get Started With It?

EdTech

Technology Solutions That Drive Education

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • EdTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • FedTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get EdTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to EdTech Magazine Browse Magazine Archives
Cover of the Summer 2022 issue of EdTech/Higher Education magazine
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061