Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 20 |
Descriptor
Source
Campus Technology | 20 |
Author
Panettieri, Joseph C. | 4 |
Demski, Jennifer | 2 |
Ramaswami, Rama | 2 |
Schaffhauser, Dian | 2 |
Villano, Matt | 2 |
Briggs, Linda L. | 1 |
Chretien, Wendy | 1 |
Diaz, Russell | 1 |
Ford, Tracy | 1 |
Gale, Doug | 1 |
O'Hanlon, Charlene | 1 |
More ▼ |
Publication Type
Journal Articles | 20 |
Reports - Descriptive | 20 |
Education Level
Higher Education | 19 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Location
Indiana | 2 |
Michigan | 2 |
Ohio | 2 |
South Carolina | 2 |
Florida | 1 |
Georgia | 1 |
Hawaii | 1 |
Illinois | 1 |
Louisiana | 1 |
Massachusetts | 1 |
Nebraska | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ford, Tracy – Campus Technology, 2012
Many institutions implement a distributed antenna system (DAS) as part of a holistic approach to providing better wireless coverage and capacity on campus. A DAS provides wireless service within a particular area or structure via a network of separate antenna nodes that are connected to a common source through fiber or coaxial cable. Because DAS…
Descriptors: Technology Planning, Information Networks, Systems Development, Computer Networks
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Diaz, Russell – Campus Technology, 2009
In 2006, when the author joined the staff at Dominican College (New York), he discovered that the network, computers, and IT contracts were in sorry shape. He also found that this kind of condition is common in small colleges. Such a state of affairs is usually brought about by the unrelenting demands placed on small IT staffs. IT staffers at…
Descriptors: School Business Relationship, Small Colleges, Information Technology, Computer Networks
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Panettieri, Joseph C. – Campus Technology, 2008
Despite the hype, IP convergence does not happen overnight. Navigating the IP convergence market is not easy. Some network equipment makers are taking traditional voice over IP (VoIP) product lines and rebranding them as unified communications offerings. But beware: While closely related, VoIP and UC are not the same. Generally speaking, VoIP…
Descriptors: Computer Networks, Information Networks, Computer Mediated Communication, Free Enterprise System
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Briggs, Linda L. – Campus Technology, 2008
The leap in wireless LAN standards to 802.11n is a WiFi upgrade so new it has not yet garnered final approval from the standards committee. Although that approval will not come until next year (vendors are currently building to a "pre-n" standard), there are plenty of notebook computers out there capable of running 802.11n. That means students…
Descriptors: Computer Networks, Telecommunications, Information Technology, Standards
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Previous Page | Next Page ยป
Pages: 1 | 2