Welcome

Security, mobility, and covergence initiatives will be topping the to-do lists of campus technology leaders in 2006. Are you ready?

When it comes to the advancement of technology on your campus or campuses, wouldn’t it be great to have at your fingertips the most pertinent information you might need to help you launch or move forward that looming security, mobility, or convergence initiative? Wouldn’t it be invaluable to be able to access—in one place—the best practices, best thoughts and ideas, and most striking innovations in those three most urgent technology areas?

Frankly, we thought so. Herewith, we present our first annual 101 Best Practices guide, this year focusing on the critical Big Three technology challenges that keep even the savviest campus CIOs up at night.

We’ve structured our guide to not only be brimming with the “what works” information you need most, but to be easily navigable, too. A quick glance at the table of contents on the preceding page will get you to the appropriate section for your current needs: Security, Mobility, or Convergence. Then, simply head to the “Where to Find…” index and resource guide on pages 8 and 10 to locate the precise topic information you’re looking for; the “best practice” numeral will get you right to your most-needed information. In addition, you can scan the resource guide to pinpoint institutions whose initiatives you may want to reference; technology-vendor companies whose products or services you may wish to research; or technology vendors who are advertisers in this issue, and for whose products you may want additional information.

Don’t miss our special CT Solutions selection this month with a special focus on security, mobility, and convergence products and services. And be sure to catch our targeted show coverage on this issue—it will steer you to the technology industry and association conferences that showcase the latest products and information sessions focused on the Big Three. Start with the Where to Find Guide for quick access or click on one of the three sections: Security, Mobility, and Convergence.

About the Author

Katherine Grayson is is a Los Angeles based freelance writer covering technology, education, and business issues.

Featured

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.

  • illustration of people collaborating around large interlocking gears and data charts

    Why ERP and AI Initiatives Stall at the Execution Layer: A CIO Perspective

    Higher education institutions are investing heavily in ERP modernization, analytics, and AI-driven capabilities. Yet even with these investments, many are running into the same issue: turning insight into coordinated, timely action.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • digital lock on a virtual background

    Encryptionless Extortion on the Rise as Ransomware Groups Shift Tactics

    Ransomware attacks continued to climb in 2025 as attackers increasingly timed operations around year-end staffing gaps and shifted away from traditional file encryption, according to new research from NordStellar.