VR Bytes Edu: Creative Ways to Use Current Hardware for VR
Are you curious about starting an esports program at your school? Join ByteSpeed during this session to hear how others have done it!
Are you curious about starting an esports program at your school? Join ByteSpeed during this session to hear how others have done it!
Learn, explore, and connect with other innovative educators at this year's IETC to harness the power of technology and prepare future-ready students.
Join Microsoft while it presents a brand new extension to the Hack the Classroom series with the focus on STEM.
SHI and Microsoft have been providing thousands of procurement and IT professionals with the product and licensing options they need.
Join this Impero Software webinar to discover how to manage the influx of digital devices, multiple computer suites, and requests for assistance while doing more with less.
In this webinar, SMART Technologies will share how to create a question-friendly, inquiry-driven classroom with SMART Learning Suite Online.
Attend this Impero Software webinar to learn how easy power management can be and how it can do more than just cut the cost of your energy.
Join this Extreme Networks webinar to learn more about Wireless Intrusion Prevention System (WIPS) with David Coleman.
This webinar will demonstrate the Center for Internet Security (CIS) and Akamai can add extensive resources and experience to your team.
Join Newline Interactive for a special premiere where the company will unbox a revolutionary new product that will change how you work.
In this webinar, you will uncover best practices for threat hunting and learn how to incorporate threat hunting into your daily workflow.
Join ITsavvy and Dell Technologies for a technical overview and demo of the world’s #1 HCI solution on December 9th at 1pm CT.
ByteSpeed will cover how to allocate a school-approved budget, tips for grant writing, and how to find sponsors.
Improve digital processes across campus from purchasing contracts and hiring forms to admissions applications and tuition remission forms.
Why use a firewall, what is a firewall, and what are the pros and cons of the different and models of firewalls?
Join this Extreme Networks webinar to learn how this technology blends ease of deployment and use with robust enterprise security.
Join Carahsoft for a live webinar to learn how SolarWinds solutions can help you monitor Microsoft Office 365® performance and security.
Tech & Learning, AV Technology and Systems Contractor News are co-hosting this one-day esports virtual conference for K-12.
Celebrate Computer Science Education Week this year with Google's flexible one-hour coding activities, online and offline!
Join Impero to learn how classroom management software can help keep students focused and empower teachers to deliver engaging lessons.
In this upcoming, live webinar join Edmentum to learn best practices for conducting a winter diagnostic for your learners.
Join ITsavvy and Cybereason to learn how Cybereason can empower defenders with its operations-centric approach to endpoint security.
Join Impero Software on Tuesday, December 8 at 3 p.m. CT for a roundtable on Social-Emotional Learning (SEL) in the time of COVID-19.
Join this JourneyEd webinar to discover how to implement seamless, secure digital workflows with Adobe Sign.
Join Edmentum for a BASE Education course experience to see how BASE Education SEL courses can be used in a full class format.
In this webinar, LearnPlatform will take 360-degree look at how privacy decisions are made and how to build a culture of privacy and security.
In this webinar, ByteSpeed's speakers will cover how to actually create unique content that can be consumed in the virtual reality space.
Join CDW-G for a K-12 Mobile Device Showcase event representing the top manufacturers’ device offerings for K-12 school districts.
Join this Impero Software webinar to learn more about how to ensure that students have access to technology but are not exposed to these risks.
Protect against cyber threats targeting educational institutions by mitigating fake account creations and credential stuffing attacks.