This is an alert ×

Search Query

    Search Options

Showing results - 1 to 10 of 64
Evolution of VDI
15:57

Evolution of VDI

Over the past decade, virtual desktop infrastructure (VDI) has transformed from an expensive, slow solution into a cost effective, easily manageable, and high performing one. Not only will it provide better campus digital security, it will also cen...

How to Build a K-12 STEM Lab: Tips for School Leaders
40:09

How to Build a K-12 STEM Lab: Tips for School Leaders

Deborah presents a template for developing a school-based Science Technology Engineering and Mathematics (STEM) Lab based on the successful example of the Alexander D. Sullivan School in Jersey City. In her session, she describes how to address the ...

Ransomware Stories from the Front Lines
53:14

Ransomware Stories from the Front Lines

Ever wonder how ransomware negotiations look? How much they actually cost? How successful are the negotiations? During this session, you will learn the answer to all of these questions and more including attackers sending the wrong decryption key...

Stop the Insanity.  A Simplistic, Yet Radical Approach to Cybersecurity in Education
39:32

Stop the Insanity. A Simplistic, Yet Radical Approach to Cybersecurity in Education

This session features a discussion around the state of Cybersecurity in our data centers today and how others are implementing a layered strategy for a comprehensive security posture. More and more malicious threats are attacking our networks as we...

Higher Education Panel on Digital Leadership
58:44

Higher Education Panel on Digital Leadership

Today, more than ever before, higher education enterprises recognize and appreciate the inextricable link between technology investment and institutional effectiveness. Attendees will hear, first hand, from this panel of senior executives from acros...

Reinventing Ethernet Networking: Dismantling Complexity in the Secure Enterprise
58:26

Reinventing Ethernet Networking: Dismantling Complexity in the Secure Enterprise

Over the past 15 years, the business demands for bigger, more secure and more resilient enterprise networks have resulted in additional network protocols, equipment and support being implemented to deliver on these demands. Unfortunately, often the...

Record, Tag and Share: illumira
46:01

Record, Tag and Share: illumira

Join the illumira team along and Montclair University as they lead you through the entire process of uploading and managing your digital media on illumira. Bring your own internet-connected device (we recommend a laptop or tablet) and, by the time t...

The Network Horizon: Current Design and Future Strategy for the NJEdge Network
46:54

The Network Horizon: Current Design and Future Strategy for the NJEdge Network

This session will provide attendees with a comprehensive presentation that will include the evolution of the network design over time, an overview of the current state of the network and our strategic vision for technical enhancements, and finally, ...

The Enemy Within
41:53

The Enemy Within

This session focuses on ransomware as both a scourge and savior and shares information on how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators and hackers. Outc...

The Future Ready Schools:  New Jersey Certification Program
33:01

The Future Ready Schools: New Jersey Certification Program

Future Ready Schools - NJ, a coalition of the New Jersey School Boards Association, New Jersey Department of Education, and New Jersey Institute of Technology, is a certification program designed to provide support, guidance, and resources to school...