Lessons from CT2016

This week's Campus Technology 2016 conference offered a wealth of ideas, conversations and commentary. Here are five takeaways.

At the Campus Technology 2016 conference in Boston this month, higher education IT leaders from across the country gathered to share their ideas and experiences. Here are some takeaways gleaned from the event's keynotes, sessions and conversations:

Students view IT as electricity — but university leadership may not, according to Thomas Hoover, associate vice chancellor and chief information officer at the University of Tennessee at Chattanooga. In the session "Confessions of a Solutions-Based IT Organization," Hoover and his UTC colleagues talked about how they've tackled funding, staffing and infrastructure issues and revamped their institution's IT organization. One of their biggest challenges: moving from a break-fix funding model ("no money until there's no service") to a more strategic approach. Hoover stressed that it's up to IT to find a way to educate the administration that technology must be a continual investment. "If you don't market yourself in IT, nobody else will," he asserted.

"If you are in education and you're not on Twitter, you might be missing a lot," said Jaime Casap, chief education evangelist at Google, encouraging attendees of his "Future Learning in Higher Education" session to follow him at @jcasap. And he's right, at least in the case of the CT conference — an active backchannel at the event (#CampusTech) provided valuable commentary throughout many of the sessions. Two particularly prolific and insightful tweeters at CT: @koutropoulos and @BryanAlexander.

Higher ed should seek transformation, not innovation. "Innovators haven't been able to get it yet" because they are finding solutions to existing problems, said keynoter Stephen Downes, MOOC pioneer and program leader for learning and performance support systems at the National Research Council of Canada. Instead, we need to focus on the changing definitions of need — reframe our perception of the benefits of new technology.

Don't say no, provide an alternative. Restrictive policies don't necessarily result in the best security, said Sadik Al-Abdulla, security practice director for CDW, in his session "State of Security 2016." The past two years have seen an 800 percent increase in users uploading confidential information to cloud storage services — mostly people just trying to do their jobs, he noted. IT needs to provide an easy, convenient and secure way for them to accomplish the same.

Wearable technologies are turning sci-fi into reality. We are going to end up in an environment where every human activity is mediated by technology, said Emory Craig, director of e-learning and instructional technologies at The College of New Rochelle (NY), who presented "Wearable Technology Innovations" with colleague Maya Georgieva, ed tech strategist and co-founder of Digital Bodies. Already, sensors can be tattooed, implanted, embedded in stickers and woven into fabrics, generating a tremendous amount of data. Craig's vision of the wearable future: "Technology will interact with us. Every possible surface will become a display. Technology that doesn't interact with us will be perceived as broken. Sensors will be everywhere. Everything that can be tracked will be tracked." We are at the tip of the iceberg when it comes to analytics, he said, and the stakes are higher when technology is worn on our bodies, generating personal data.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • data professionals in a meeting

    Data Fluency as a Strategic Imperative

    As an institution's highest level of data capabilities, data fluency taps into the agency of technical experts who work together with top-level institutional leadership on issues of strategic importance.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.

  • university building with classical architecture is partially overlaid by a glowing digital brain graphic

    NSF Invests $100 Million in National AI Research Institutes

    The National Science Foundation has announced a $100 million investment in National Artificial Intelligence Research Institutes, part of a broader White House strategy to maintain American leadership as competition with China intensifies.

  • black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

    The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

    With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.