Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 2 |
Guidelines | 2 |
Higher Education | 2 |
Technology Planning | 2 |
Administrator Role | 1 |
Best Practices | 1 |
Computer Security | 1 |
Computer System Design | 1 |
Computer Uses in Education | 1 |
Data | 1 |
Design Requirements | 1 |
More ▼ |
Source
Campus Technology | 2 |
Author
Chretien, Wendy | 1 |
Villano, Matt | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks