Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 8 |
Descriptor
Author
Bennett, Cedric | 1 |
Daniel, Ben | 1 |
Hacker, Thomas J. | 1 |
Haughton, Noela A. | 1 |
Keil, Virginia L. | 1 |
Ravage, Barbara | 1 |
Villano, Matt | 1 |
Waters, John K. | 1 |
Weiss, Meredith | 1 |
Wheeler, Bradley C. | 1 |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 6 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 6 |
Audience
Location
Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daniel, Ben – Educational Technology, 2017
The increasing availability of digital data in higher education provides an extraordinary resource for researchers to undertake educational research, targeted at understanding challenges facing the sector. Big data can stimulate new ways to transform processes relating to learning and teaching, and helps identify useful data, sources of evidence…
Descriptors: Higher Education, Educational Research, Information Utilization, Data
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Waters, John K. – Campus Technology, 2012
Colleges and universities are swimming in an ever-widening sea of data. Human beings and machines together generate about 2.5 "quintillion" (10[superscript 18]) bytes every day, according to IBM's latest estimate. The sources of all that data are dizzyingly diverse: e-mail, blogs, click streams, security cameras, weather sensors, social networks,…
Descriptors: Electronic Publishing, Data, Information Utilization, Information Management
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Keil, Virginia L.; Haughton, Noela A. – Journal of Educational Computing Research, 2009
The College of Education Assessment Infrastructure Survey was developed and administered to 1011 institutions over a 12-month period ending April 2007. The survey examined the capacity of university-based teacher preparation programs to respond to the growing and increasingly complex data management requirements that accompanies assessment and…
Descriptors: Accountability, Teacher Education Programs, Schools of Education, Institutional Evaluation
Weiss, Meredith – EDUCAUSE Quarterly, 2008
Interaction design is a user-centered approach to development in which users and their goals are the driving force behind a project's design. Interaction design principles are fundamental to the design and implementation of effective websites, but they are not sufficient. This article argues that, to reach its full potential, a website should also…
Descriptors: Computer Software, Marketing, Interaction, Web Sites
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration