Top 10 Strategic Technologies for 2015 Resources

The 2015 top 10 strategic technologies were selected from the analysis of a vetted set of 107 technologies presented to EDUCAUSE members in a survey in fall 2014. The items below have been selected to provide further information or highlight examples of the top 10 strategic technologies.

802.11ac Wireless Networking Standard

  • Distributed Antenna Systems: ACTI Briefing Note. ECAR, 2012. This briefing note from the ACTI Communication, Collaboration, and Mobility Working Group provides an overview of distributed antenna system (DAS) solutions for in-building wireless coverage for cellular voice services on higher education campuses.
  • Five Reasons Why Colleges are Taking the 802.11ac Plunge, Aruba Networks blog, August 2013.
  • 802.11ac: The New Standard for Very High Throughput [], Meru Networks. This site includes a white paper and a tech brief on the new IEEE standard.


Administrative or Business Performance Analytics.


Business Intelligence Reporting Dashboards


Enterprise Identity and Access Management Solutions

  • InCommon. Operated by Internet2, InCommon provides a secure and privacy-preserving trust fabric for research and higher education, and their partners, in the United States. InCommon operates an identity management federation, a related assurance program, and offers certificate and multifactor authentication services.
  • IAM Tools & Effective Practices Wiki: This wiki provides a set of resources for IAM Architects to use in implementing a cohesive program on their respective campuses.
  • CommIT. Common Identity and Trust Collaborative. CommIT intends to, Ease the process for high school students preparing their college applications, Assist higher education IT departments, Admissions Officers, and Registrars in accepting applications from and provisioning resources to prospects, Improve the offerings of the participating vendors, and improve the quality of prospect credentials.
  • Identity Ecosystem Steering Group []. The Identity Ecosystem envisioned in the NSTIC [] is an online environment that will enable people to validate their identities securely, but with minimized disclosure of personal information when they are conducting transactions.


Incorporation of Mobile Devices in Teaching and Learning


Mobile App Development


Mobile Apps for Enterprise Applications


Mobile Apps for Teaching and Learning

  • Mobile Advising: Engage Students and Contain Costs, April 21, 2014. This case study provides an example of how digital records and mobile technology improve communication between students, departments, and offices while reducing administrative tasks and costs.


Mobile Data Protection

  • An Introduction to BYOE Mobile Data Collection , April 24, 2014. This paper serves as an introduction to the four main types of Modbile Data Collection —passive, public, crowdsourced, and private—highlighted with exploratory use cases that demonstrate how learning, research, and community engagement can leverage this new technology space.


Unified Communications and Collaboration


Higher Education’s Top 10 Strategic Technologies for 2015 Hub