Calendar

APRIL 99

6, New York, N.Y. SkyForum '99, sponsored by Satellite Broadcasting & Communications Association (SBCA), Marriott Marquis. Contact: (703) 549-6990, ext. 364, www.sbca.com.

7-10, Orlando, Fla. 32nd National Congress on Aviation and Space Education, sponsored by Civil Air Patrol, Omni Rosen Hotel. Contact: www.cap.af.mil/ncase.

14-16, Breckinridge, Colo. 10th Annual Distance Learning Conference, "Beyond Boundaries," sponsored by the Telecommunications Cooperative for Colorado (TELECOOP), The Village at Breckinridge. Contact: (303) 365-7523, www.telecoop.org.

14-17, Baltimore, Md. Connected Classroom Conference, sponsored by Classroom Connect, Baltimore Convention Center. Contact: Classroom Connect, (800) 638-7639, www.classroom.com.

21-24, Ontario, Calif. Technology in Education International Conference and Exposition, sponsored by Community College Foundation, Ontario Convention Center. Contact: (916) 446-5881, www.communitycollege.com.

29-30, San Diego, Calif. Grants & Funding for School Technology: Proven Strategies for Capturing Your Piece of the $30 Billion Pie, sponsored by eSchool News, Wyndham Emerald Plaza. (800) 394-0115 ext. 119, www.eschoolnews.org/conf/g-f.html.

MAY 99

1-2, Cambridge, Mass. Inspirations from Reggio Emilia: The Power of Pleasure and Materials, sponsored by Center for Children, Families and Public Policy, Lesley College. Contact: Marta Gredler or Mary Mindess, (617) 349-8922, [email protected].

12-15, Los Angeles, Calif. E3: Electronic Entertainment Expo, sponsored by Interactive Digital Software Association, Los Angeles Convention Center. Contact: (800) 315-1133, www.e3expo.com.

JUNE 99

1-4, Baltimore, Md. TU/GIS '99, "The Internet and GIS: Exploring New Mapping Opportunities," sponsored by the Center for Geographic Information Sciences at Towson University, Baltimore Convention Center. Contact: Dr. John M. Morgan, III, (410) 830-2964, [email protected].

10-12, Orlando, Fla. INFOCOMM International, sponsored by ICIA, Orange County Convention Center. Contact: (800) 659-7469, www.infocomm.org.

22-24, Atlantic City, N.J. NECC '99, "Spotlight on the Future," sponsored by the National Education Computing Association (NECA), Inc., Atlantic City Convention Center. Contact: (541) 346-6322, www.neccsite.org.

27-30, St. Paul, Minn. 1999 National Media Education Conference, "Taking Charge in Changing Times," sponsored by the Partnership for Media Education (PME), Radisson Hotel. Contact: (303) 756-8380, www.nmec.org

All rights Reserved 1998 T.H.E. Journal, L.L.C.

Featured

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • laptop with a neural network image, surrounded by books, notebooks, a magnifying glass, a pencil cup, and a desk lamp

    D2L Updates Lumi with Personalized Study Supports

    Learning platform D2L has introduced new artificial intelligence features for D2L Lumi that help provide more personalized study supports for students.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.