Changing lives through education: 4 best practices for success
Read these best practices to discover how The University of North Carolina at Pembroke uses technology to improve access and security and expand opportunities for its students.
At UNCP, cybersecurity is part of a campus culture
This Cybersecurity Awareness Month, discover how one university built a culture of security and implemented an integrated, automated security portfolio, amplified with threat intelligence, that helps safeguard users and resources.
Unique program educates students and helps close the cybersecurity skills gap
Cisco Cyber Defense Clinic provides a free cybersecurity lab environment that educators can integrate into coursework to enable students to engage hands-on with advanced cybersecurity technologies.
A future-ready workforce: Cisco Networking Academy preps 9.2 million students
New data shows that 9.2 million students—1.6 million in the U.S.—are ready for STEM careers thanks to Cisco Networking Academy. And they’re earning 22% more than their peers.
Creating Learning Spaces that Promote Active Learning
Learning can take place anytime, anywhere, and on any device. Learning is no longer confined to a physical time or location – it happens in spaces that transcend traditional, physical...
Our Top 5 education posts of 2018: See what you missed
We’re looking back at our five most-read blog posts of 2018. If you missed them the first time, now’s your chance to see why they resonated with other readers.
4 best practices for research networking at Montana State University
Research is a core pillar of MSU’s land-grant mission. Here’s how software-defined access reshaped research networking—and the user experience—across campus.
On a connected campus, wireless is the invisible hero
In September, my daughter moved into her dorm room with a cell phone, laptop, smart watch, smart speaker, and printer. Not too long ago, I was thrilled with a Coronamatic.
Is this legal? For AI and IoT, W&M Law School aims to find out
As technology changes how we live, great minds are considering ways to secure us against new cyber threats. But who is protecting us from the legal vulnerabilities we may face?