Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Campus Technology | 6 |
EDUCAUSE Quarterly | 1 |
Journal of Information… | 1 |
New Directions for Student… | 1 |
Perspectives: Policy and… | 1 |
ProQuest LLC | 1 |
Author
Alexander, Julie S. | 1 |
Briggs, Linda L. | 1 |
Cobb, Chris | 1 |
Larusson, Johann Ari | 1 |
Lunsford, Dale L. | 1 |
Panettieri, Joseph C. | 1 |
Ramaswami, Rama | 1 |
Raths, David | 1 |
Salas, Grace | 1 |
Schaffhauser, Dian | 1 |
Schoedel, Eric | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 10 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 10 |
Elementary Secondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Schoedel, Eric – EDUCAUSE Quarterly, 2009
Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…
Descriptors: Computer Networks, Telecommunications, Statewide Planning, Technology Planning
Larusson, Johann Ari – ProQuest LLC, 2010
Prior research has highlighted the educational benefit of enabling students to participate in collaborative learning activities. Developing technology that extends the physical boundaries of the classroom and enables students to engage in meaningful collaborative learning activities outside class time can be of significant value. For any…
Descriptors: Learning Activities, Educational Benefits, Cooperative Learning, Interaction
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Briggs, Linda L. – Campus Technology, 2008
The leap in wireless LAN standards to 802.11n is a WiFi upgrade so new it has not yet garnered final approval from the standards committee. Although that approval will not come until next year (vendors are currently building to a "pre-n" standard), there are plenty of notebook computers out there capable of running 802.11n. That means students…
Descriptors: Computer Networks, Telecommunications, Information Technology, Standards
Salas, Grace; Alexander, Julie S. – New Directions for Student Services, 2008
Regardless of whether an institution is a reluctant passenger on the racing technology train or itching to throw another shovel of coal on the fire, continuing advancements in technology make it a formidable factor in life on college campuses today. While students are updating their most recent social networking sites, faculty, staff, and…
Descriptors: Higher Education, Academic Achievement, Student Personnel Services, Technology Uses in Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering