Information Technology


Report: IT Purchasing Decisions Shifting From Tech Refresh Cycles to Business Goals

When it comes to IT purchasing decisions, three- to five-year technology refresh cycles have been losing steam over the past year or two. Instead, IT decision-makers have shifted their attention to ways technology can help organizations meet business goals, according to a new survey from IDG Research Services and Datalink.

Westmont College Streamlines Admissions with Constituent Relationship Management

Westmont College has selected a new constituent relationship management platform in an effort to modernize its enrollment processes.

Top 7 Campus Technology Stories in January

The numbers are in: Here's what got the most attention on our Web site last month.

Report: Phishing Attacks on the Rise

Phishing attacks are up 13 percent and spear phishing attacks are up 22 percent from 2014, according to new research from Wombat Security Technologies.

New Blackboard CEO Bill Ballhaus Reflects on His First Weeks at the Helm

Ballhaus likes what he sees at the company he now leads, especially the breadth of its offerings and its capabilities.

Netgear Beefs up WAC730, WAC720 Access Points with Controller Management

Netgear has enhanced its new ProSAFE WAC730 and WAC720 802.11ac wireless access points to support controller management through the ProSAFE WC7600 and WC9500 controllers.

NYU Wireless To Build Test Bed for 5G

NYU Wireless, New York University's multidisciplinary academic research center for wireless networking theories and techniques, is building an advanced programmable platform to support the development of millimeter wave wireless communication, also known as 5G.

Academic Program Delivers Malware Reverse Engineering Tools and Training

A company in the security segment has opened up a new academic program to provide training to students and faculty in colleges and universities in security incidence response.

Toshiba Intros Surveillance Education Program

Toshiba's security division has introduced a new bundle of services for schools that use its surveillance equipment.

In 2016 Smartphones, IoT and Mobile Payment at Top of List for Break-ins

Malware will grow. Attacks on Android and other mobile devices will continue. And payment platforms and the Internet of Things will become sources for new kinds of security vulnerabilities. These all surface as predictions from security vendor Panda Software for the new year.

Campus Technology News

Sign up for our newsletter.

I agree to this site's Privacy Policy.