NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Schaffhauser, Dian – Campus Technology, 2013
The pendulum of technology control in higher education has swung away from central IT toward the users. It has become easier for individuals and departments to find their own computing solutions via mobile apps, the cloud, BYOD, web services, and other means. As a result, IT can often find itself out of the loop in certain technology decisions.…
Descriptors: Information Technology, Information Management, Information Policy, Campuses
Schaffhauser, Dian – Campus Technology, 2013
For any institution looking to shift enterprise resource planning (ERP) systems to the cloud, big savings can be achieved--but only if the school has properly prepped "before" negotiations begin. These three steps can help: (1) Mop up the mess first; (2) Understand the true costs for services; and (3) Calculate the cost of transition.
Descriptors: Cost Effectiveness, Information Management, Information Policy, Technology Planning
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Schaffhauser, Dian – Campus Technology, 2013
Plagiarism is rife on campus, with students lifting material from a host of online sources. While technology has made cheating much easier, can it also provide a solution? Internet access allows students to hit cheat sites and paper mills, copy off websites, and "collaborate" with fellow students. However taking an optimistic view of the…
Descriptors: Plagiarism, Copyrights, Influence of Technology, Information Policy
Raths, David – Campus Technology, 2013
There is a civil war simmering in classrooms nationwide. Arrayed on one side are students who would sooner cut off an arm than sacrifice their mobile devices. On the other stand faculty members who expect to be the focal point of their classes and will not abide distractions. Caught in the crossfire are instructional technology professionals.…
Descriptors: Cooperative Learning, Technology Planning, Technology Uses in Education, Handheld Devices
Norbury, Keith – Campus Technology, 2012
Lecture capture technology has advanced to a point where implementing a solution can be disarmingly simple. But it is important for faculty and administrators not to be lulled into a false sense of security--recording faculty and guest lectures still comes with its share of legal issues covering copyright, intellectual property rights,…
Descriptors: Copyrights, Legal Problems, Lecture Method, Intellectual Property
Fredette, Michelle – Campus Technology, 2012
"Rent or buy?" is a question people ask about everything from housing to textbooks. It is also a question universities must consider when it comes to high-performance computing (HPC). With the advent of Amazon's Elastic Compute Cloud (EC2), Microsoft Windows HPC Server, Rackspace's OpenStack, and other cloud-based services, researchers now have…
Descriptors: Systems Development, Educational Technology, Technology Planning, Information Networks
Demski, Jennifer – Campus Technology, 2010
A downturn in the economic climate and an upturn in the technological climate might be higher education IT's "perfect storm." The confluence of budget cuts with the increased reliance on technology in almost all disciplines and administrative areas has put enormous pressure on campus IT leaders to pinpoint and fund tech services that achieve…
Descriptors: Higher Education, Campuses, Information Technology, Economic Impact
Raths, David – Campus Technology, 2010
Many chief information officers (CIOs) have come to accept and even embrace the role of outsourcers in their portfolio of IT services. In 2009, 47 percent of the 352 CIOs surveyed by the Center for Higher Education Chief Information Officer Studies (CHECS) said they had selectively outsourced some part of the IT function, up from 43 percent the…
Descriptors: Higher Education, Information Technology, Outsourcing, Strategic Planning
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Briggs, Linda L. – Campus Technology, 2008
The leap in wireless LAN standards to 802.11n is a WiFi upgrade so new it has not yet garnered final approval from the standards committee. Although that approval will not come until next year (vendors are currently building to a "pre-n" standard), there are plenty of notebook computers out there capable of running 802.11n. That means students…
Descriptors: Computer Networks, Telecommunications, Information Technology, Standards
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering