Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Classroom
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

students on laptops

Security

Security, Privacy and Confidentiality: What’s the Difference?

Network connectivity

Networking

How the University of Michigan Executed a Network Connectivity Upgrade

Adult learners in higher ed

Classroom

How Technology Investments Can Better Engage Adult Learners

Higher Ed influencer list 2021
The 2021 Dean’s List: 30 Higher Ed IT Influencers Worth a Follow
Jun 15 2021

Here are the savviest higher education IT leaders, bloggers, podcasters and social media personalities you should follow.

Cover of the Summer 2022 issue of EdTech/Higher Education magazine

EdTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Steve Zurier

About the Author:

Steve Zurier is a freelance technology writer based in Columbia, Md.  

Follow On: Google+ Twitter

Security

Bring Shadow IT Out of the Dark

Partnerships and best practices help staff embrace the cloud without risk.

Hardware

Neurotechnology Could Lead to Thought-Controlled Devices

Data Center

Smashing Data Storage Records

Collaboration

WebRTC Helps Bring Video Conferencing to More Apps

Data Center

This College's Virtual Backup Solution Is Prepared for When Disaster Strikes

Classroom

Colleges Find Gamification Success Through Sports Influence
University Uses Software-Defined WANs to Extend LANs to the Cloud

Networking

University Uses Software-Defined WANs to Extend LANs to the Cloud

Mobility

Wireless Displays on the Horizon at Colleges

Software

Colleges Control Costs with Asset Management Software
Texas A&M University

Security

Colleges Take a Comprehensive Approach to Security

Management

Bridging the Digital Divide Through Smart Modernization
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

students on laptops

Security, Privacy and Confidentiality: What’s the Difference?

Network connectivity

How the University of Michigan Executed a Network Connectivity Upgrade

Adult learners in higher ed

How Technology Investments Can Better Engage Adult Learners

Ed Hudson, CISO at California State University

Universities Share Lessons Learned from Ransomware Attacks

Subtopics

Two people look at a set of computer monitors

Security

5 Security Myths About Google Workspace for Education

EdTech

Technology Solutions That Drive Education

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • EdTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • FedTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get EdTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to EdTech Magazine Browse Magazine Archives
Cover of the Summer 2022 issue of EdTech/Higher Education magazine
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061