This is an alert ×

Search Query

    Search Options

Showing results - 81 to 90 of 308
LISP
49:25

LISP

Recently, NJEdge.NET has deployed a LISP architecture to help reduce the complexity of configuration required at the Internet Edge as well as enable 0-procedure (No DNS changes, No BGP configuration) disaster recovery solutions for Cloud Computing. ...

PedTech 2: The Merger of Pedagogy and Technology - Lecturing in Cyberspace
31:23

PedTech 2: The Merger of Pedagogy and Technology - Lecturing in Cyberspace

At this year's NJEDge Annual Conference, we presented this topic as part of Ignite. For this presentation, we will demonstrate easy to use methods for translating a traditional classroom lecture into a workable online multimedia piece. Attention wil...

NJEDge.Net Virtualization & Community Cloud Day : Part 1
49:50

NJEDge.Net Virtualization & Community Cloud Day : Part 1

Plenary sessions recorded at NJEDge.Net's inaugural "Virtualization & Community Cloud Day" at the Institute for Advanced Study on March 28, 2013, featuring Joe Weinman, author of "Cloudonomics," Kit Colbert, from the office of the CTO at VMware and ...

Evolution of VDI
15:57

Evolution of VDI

Over the past decade, virtual desktop infrastructure (VDI) has transformed from an expensive, slow solution into a cost effective, easily manageable, and high performing one. Not only will it provide better campus digital security, it will also cen...

How to Build a K-12 STEM Lab: Tips for School Leaders
40:09

How to Build a K-12 STEM Lab: Tips for School Leaders

Deborah presents a template for developing a school-based Science Technology Engineering and Mathematics (STEM) Lab based on the successful example of the Alexander D. Sullivan School in Jersey City. In her session, she describes how to address the ...

Game Design and Student Retention: An Opportunity for NJEdge
32:13

Game Design and Student Retention: An Opportunity for NJEdge

Good design produces ancillary benefits. Engagement science applies the principles of gameful design to non-game situations - in this case to the problem of low rates of student retention and completion. We summarize how and why (a) 50 years of stud...

Ransomware Stories from the Front Lines
53:14

Ransomware Stories from the Front Lines

Ever wonder how ransomware negotiations look? How much they actually cost? How successful are the negotiations? During this session, you will learn the answer to all of these questions and more including attackers sending the wrong decryption key...

Stop the Insanity.  A Simplistic, Yet Radical Approach to Cybersecurity in Education
39:32

Stop the Insanity. A Simplistic, Yet Radical Approach to Cybersecurity in Education

This session features a discussion around the state of Cybersecurity in our data centers today and how others are implementing a layered strategy for a comprehensive security posture. More and more malicious threats are attacking our networks as we...

Higher Education Panel on Digital Leadership
58:44

Higher Education Panel on Digital Leadership

Today, more than ever before, higher education enterprises recognize and appreciate the inextricable link between technology investment and institutional effectiveness. Attendees will hear, first hand, from this panel of senior executives from acros...

Hour of Code - Expanding the Reach of Computer Science
23:21

Hour of Code - Expanding the Reach of Computer Science

I will present the experiences that I have had establishing the annual CCM Hour of Code event, the ease and challenges doing so, the successful outcomes and expansion of the program. I will share with participants the resources available to them to ...