Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • Must Read IT Blog
    • UniversITy
    • Digital Equity
    • About Insider
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • Must Read IT Blog
    • UniversITy
    • Digital Equity
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Classroom
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

A woman studies with her laptop

Classroom

What Is Digital Literacy for Higher Ed Faculty? 5 Important Skills to Teach

A woman holds a tablet device

Networking

Wi-Fi 6E: What Higher Ed IT Needs to Know

A higher ed student presents to her classmates

Classroom

3 Tech Trends Shaping Modern Higher Ed Classrooms

2022 Influencers
30 Higher Education IT Influencers to Follow in 2022
Jun 27 2022

Keep these higher education IT leaders, bloggers, podcasters and social media personalities on your radar.

Cover of Winter 2022 EdTech Magazine

EdTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Tom Jordan

Tom Jordan
About the Author:

Tom Jordan is a solutions architect at the University of Wisconsin–Madison.

Follow On:
A group of people gathered around a table

Security

The Importance of Tabletop Exercises for Higher Ed IT Teams

Testing a university’s incident response plan can help cybersecurity teams identify weaknesses and make improvements.

security architecture

Security

How to Design a Security Architecture
CCoE

Cloud

How and Why to Establish a Cloud Center of Excellence
zero trust

Security

To Prevent Ransomware Attacks, Understand the Zero-Trust Model
4 Signs That You Should Say Goodbye to Legacy Technology

Management

4 Signs That You Should Say Goodbye to Legacy Technology
Adobe Sign

Digital Workspace

Review: Adobe Sign Cuts Costs and Improves Workflow
Cisco Meraki Z3

Networking

Review: Cisco Meraki Z3 Grants Teleworking Wishes
HP Z book

Hardware

Review: Latest HP ZBook Pairs Performance and Portability
Acer S1385WHne DLP Projector

Hardware

Product Review: Acer S1385WHne DLP Projector Lights Up Class
Epson PowerLite 1985WU

Classroom

Review: Epson PowerLite LCD Projector Brightens Classrooms

Hardware

Product Review: Lenovo's Hybrid Tablet Takes On All Tasks
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

A woman studies with her laptop

What Is Digital Literacy for Higher Ed Faculty? 5 Important Skills to Teach

A woman holds a tablet device

Wi-Fi 6E: What Higher Ed IT Needs to Know

A higher ed student presents to her classmates

3 Tech Trends Shaping Modern Higher Ed Classrooms

An illustration of students interacting

How Higher Ed Can Keep Up With Evolving Data Environments

Illustration of a lock representing cybersecurity

Security

What’s New in SIEM for Higher Education InfoSec Teams?

EdTech

Technology Solutions That Drive Education

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • EdTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • FedTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get EdTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to EdTech Magazine Browse Magazine Archives
Cover of Winter 2022 EdTech Magazine
Back To Top

Copyright © 2023 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information