CT Tech Tactics
10/24/2024
Read in Browser
 

Spotlight

  • AI Dominates Key Technologies and Practices in Cybersecurity and Privacy

    AI governance, AI-enabled workforce expansion, and AI-supported cybersecurity training are three of the six key technologies and practices anticipated to have a significant impact on the future of cybersecurity and privacy in higher education, according to the latest Cybersecurity and Privacy edition of the Educause Horizon Report.

    More


News

 

Professional Resources

Survey: Your Data Storage Challenges

Tell us how the evolving data landscape is impacting storage at your institution.
Take the Survey

. . .

An AI-Native Network Puts Location Services at the Core of the Student Experience

Join us for a live fireside chat:
Date: 11/13/24
Time: 11:00 AM PT
Sponsored by Juniper Networks
Register Now

. . .

From Applicant to Alumni: Integrating the Student Lifecycle into Identity Management

Join us for a live fireside chat:
Date: 11/14/24
Time: 11:00 AM PT
Sponsored by Okta and Carahsoft
Register Now

. . .

Getting Identity Right: Why Flexibility Is Key to a Modern IAM Solution

Join us for a live fireside chat:
Date: 11/21/24
Time: 11:00 AM PT
Sponsored by Unicon
Register Now

SUBSCRIBE TO OUR NEWSLETTERS

Click here to stay on top of the rapidly changing field of technology in higher education.

We offer seven newsletters:
News Update (twice per week)
Tech Tactics (twice per month)
Learning Environments (twice per month)
Insider (once per month)
C-Level View (once per month)
College to Workforce (once per month)
Pulse (once per month)
Encourage your peers to excel: Please forward this newsletter to your colleagues.
Campus Technology
 
Tech Tactics is targeted toward higher education IT professionals, managers and C-level executives, and is packed with the latest information about networking, analytics, hardware, developer tools, data security, wireless, virtualization, cloud computing and more. Tech Tactics also offers up project profiles, case studies, interviews and articles focusing on best practices in information technology, IT strategy and IT management. Published twice monthly.