{"id":1822,"date":"2012-05-29T14:44:00","date_gmt":"2012-05-29T14:44:00","guid":{"rendered":"http:\/\/cloudnewsdaily.com\/?guid=d7437956d17ad393bfb9f12c38d14936"},"modified":"2012-05-29T14:44:00","modified_gmt":"2012-05-29T14:44:00","slug":"online-tech-offers-data-security-scholarship-to-college-students","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/online-tech-offers-data-security-scholarship-to-college-students\/","title":{"rendered":"Online Tech Offers Data Security Scholarship to College Students"},"content":{"rendered":"<\/p>\n<p><span class=\"org fn\"><span>Online Tech is awarding two $1,000 scholarships to students interested in pursuing a career in information technology, computer sciences and healthcare information technology. The 2012 Data Security Scholarship will be available for the Fall semester of the 2012-2013 academic year.<\/span> <\/span><\/p>\n<p>Applicants should show an interest in <span>cloud computing<\/span>, data computing, <span>disaster recovery<\/span><span>, colocation and similar topics as it relates to the ever-changing fields of information technology and healthcare IT.<\/span><\/p>\n<p><span>\u201cOnline Tech feels strongly about offering the scholarship in order to encourage tomorrow\u2019s technology leaders to pursue higher education in their respective fields,\u201d said April Sage, Online Tech\u2019s Director of Healthcare Vertical and Marketing.<\/span><\/p>\n<p><span id=\"more-10368\"><\/span><\/p>\n<p><span>Scholarships awarded by Online Tech will be based on the applicant\u2019s response to one of the following questions:<\/span><\/p>\n<p><span><strong>1. Healthcare: \u201cWhat do you see as the best technology for improving healthcare and health IT?&#8221;<\/strong><\/span><\/p>\n<p><span><strong>2. Mobile Security: \u201cWhat do you see as the most serious mobile security threat facing consumers and\/or companies and why?\u201d<\/strong><\/span><\/p>\n<p><span>While the traditional essay submission is one option, Online Tech has also opened up the submissions to take the form of a short, 10-minute video or an infographic complete with a brief explanation.<\/span><\/p>\n<p><span>All interested students can apply on Online Tech\u2019s website by clicking <\/span><a href=\"http:\/\/www.onlinetech.com\/secure-hosting\/hipaa-compliant-hosting\/resources\/online-tech-2012-data-security-scholarship\">here<\/a><span>. Submissions should submitted no later than July 8, 2012. Winners for the award will be announced by August 10, 2012.<\/span><\/p>\n<div class=\"zemanta-pixie\" style=\"margin-top: 10px; height: 15px;\"><img decoding=\"async\" class=\"zemanta-pixie-img\" style=\"float: right;\" src=\"http:\/\/img.zemanta.com\/pixy.gif?x-id=cb4ae696-4aac-4c0b-b470-63574f022597\" alt=\"\" \/><\/div>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/lWUlNPAvoO_Au8_rqYExTchP56g\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/lWUlNPAvoO_Au8_rqYExTchP56g\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/lWUlNPAvoO_Au8_rqYExTchP56g\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/lWUlNPAvoO_Au8_rqYExTchP56g\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/CloudNewsDaily\/~4\/cssPUuVWroU\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech Scholarship to Provide Students Interested in        Technology the Opportunity to Pursue Higher Education     ANN ARBOR, Mich.&#8211;(BUSINESS WIRE)&#8211;Online Tech is awarding two $1,000 scholarships to students        interested in pursu&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216,426,427],"tags":[118],"class_list":["post-1822","post","type-post","status-publish","format-standard","hentry","category-education","category-information-technology","category-scholarship","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=1822"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1822\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=1822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=1822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=1822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}