Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
EDUCAUSE Quarterly | 5 |
Author
Barry, Jim | 1 |
Bennett, Cedric | 1 |
Buchner, Marc | 1 |
Forsstrom, Jan | 1 |
Gilgen, Read | 1 |
Ham, Gary | 1 |
Hesse, Christopher | 1 |
Mehregany, Mehran | 1 |
Powel, Wayne D. | 1 |
White, Lee | 1 |
Zhang, Guo-Qiang | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Location
Massachusetts | 1 |
Ohio | 1 |
Washington | 1 |
Wisconsin | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Forsstrom, Jan; Ham, Gary – EDUCAUSE Quarterly, 2007
Five years ago, North Shore Community College (NSCC) encountered rising enrollments in the face of lagging state funding. The addition of two new campuses stretched NSCC thin as it attempted to provide administrative and academic services across five (more recently consolidated to four) locations. Its students increasingly struggled to balance the…
Descriptors: Community Colleges, Multicampus Colleges, Information Technology, Web Sites
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Zhang, Guo-Qiang; White, Lee; Hesse, Christopher; Buchner, Marc; Mehregany, Mehran – EDUCAUSE Quarterly, 2005
Virtually every academic department in an institute of higher education requires Web presence as a critical component of its information technology strategy. The problem of how to leverage the World Wide Web and build effective and useful departmental Web sites seems to have long been solved. Yet browsing academic Web sites from around the world…
Descriptors: Design, Cost Effectiveness, Engineering Education, Computer Software
Gilgen, Read – EDUCAUSE Quarterly, 2005
Three years ago, the language lab at the University of Wisconsin-Madison encountered the same challenge many campuses face. Older analog technologies were getting harder--in some cases impossible--to maintain, thus making the move to digital technologies a necessity. A typical solution would have been to digitize existing materials and substitute…
Descriptors: Humanities, Grants, Program Implementation, College Administration