Main Nav

The 2015 top 10 strategic technologies were selected from the analysis of a vetted set of 107 technologies presented to EDUCAUSE members in a survey in fall 2014. The items below have been selected to provide further information or highlight examples of the top 10 strategic technologies.

802.11ac Wireless Networking Standard

 

Administrative or Business Performance Analytics.

 

Business Intelligence Reporting Dashboards

 

Enterprise Identity and Access Management Solutions

  • InCommon. Operated by Internet2, InCommon provides a secure and privacy-preserving trust fabric for research and higher education, and their partners, in the United States. InCommon operates an identity management federation, a related assurance program, and offers certificate and multifactor authentication services.
  • IAM Tools & Effective Practices Wiki: This wiki provides a set of resources for IAM Architects to use in implementing a cohesive program on their respective campuses.
  • CommIT. Common Identity and Trust Collaborative. CommIT intends to, Ease the process for high school students preparing their college applications, Assist higher education IT departments, Admissions Officers, and Registrars in accepting applications from and provisioning resources to prospects, Improve the offerings of the participating vendors, and improve the quality of prospect credentials.
  • Identity Ecosystem Steering Group. The Identity Ecosystem envisioned in the NSTIC is an online environment that will enable people to validate their identities securely, but with minimized disclosure of personal information when they are conducting transactions.

 

Incorporation of Mobile Devices in Teaching and Learning

 

Mobile App Development

 

Mobile Apps for Enterprise Applications

 

Mobile Apps for Teaching and Learning

  • Mobile Advising: Engage Students and Contain Costs, April 21, 2014. This case study provides an example of how digital records and mobile technology improve communication between students, departments, and offices while reducing administrative tasks and costs.

 

Mobile Data Protection

  • An Introduction to BYOE Mobile Data Collection , April 24, 2014. This paper serves as an introduction to the four main types of Modbile Data Collection —passive, public, crowdsourced, and private—highlighted with exploratory use cases that demonstrate how learning, research, and community engagement can leverage this new technology space.

 

Unified Communications and Collaboration

 

Higher Education’s Top 10 Strategic Technologies for 2015 Hub