NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Schaffhauser, Dian – Campus Technology, 2013
The pendulum of technology control in higher education has swung away from central IT toward the users. It has become easier for individuals and departments to find their own computing solutions via mobile apps, the cloud, BYOD, web services, and other means. As a result, IT can often find itself out of the loop in certain technology decisions.…
Descriptors: Information Technology, Information Management, Information Policy, Campuses
Schaffhauser, Dian – Campus Technology, 2013
For any institution looking to shift enterprise resource planning (ERP) systems to the cloud, big savings can be achieved--but only if the school has properly prepped "before" negotiations begin. These three steps can help: (1) Mop up the mess first; (2) Understand the true costs for services; and (3) Calculate the cost of transition.
Descriptors: Cost Effectiveness, Information Management, Information Policy, Technology Planning
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Demski, Jennifer – Campus Technology, 2010
A downturn in the economic climate and an upturn in the technological climate might be higher education IT's "perfect storm." The confluence of budget cuts with the increased reliance on technology in almost all disciplines and administrative areas has put enormous pressure on campus IT leaders to pinpoint and fund tech services that achieve…
Descriptors: Higher Education, Campuses, Information Technology, Economic Impact
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering