NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 43 results Save | Export
Peer reviewed Peer reviewed
Stern, Andrea – Educause Quarterly, 2001
Describes how organizations can become effective, efficient managers of the large maintenance part of their information technology budgets by using service management processes. Discusses the example of the University of Sydney Library's use of the Information Technology Infrastructure Library (ITIL) set of service management practices. (EV)
Descriptors: Computer Uses in Education, Higher Education, Information Technology, Maintenance
Peer reviewed Peer reviewed
Ayati, M. B.; Curzon, Susan Carol – Educause Quarterly, 2003
Asserts that before failure occurs for chief information officers (CIOs), three major warning signs signal that the CIO is in trouble. Explores the three warning signs, discussing how intervene before problems have gone too far to resolve: (1) the importance of executive support; (2) the significance of strategic directions; and (3) the importance…
Descriptors: Administrator Role, Computer Uses in Education, Educational Technology, Higher Education
Peer reviewed Peer reviewed
Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Peer reviewed Peer reviewed
Sommer, Lucie Isenhart – Educause Quarterly, 2002
Describes a new support model created to address the need for improved technology integration opportunities--Whole-Context, Instruction-Driven Support for Higher Education Technology (WISE)--and its initial pilot. (EV)
Descriptors: Computer Uses in Education, Faculty Development, Higher Education, Technology Integration
Peer reviewed Peer reviewed
Lanicci, John M. – Educause Quarterly, 2002
Describes how a concept model for incorporating information technology in the Air War College education process addressed process, planning, and relevancy problems. (EV)
Descriptors: Computer Uses in Education, Higher Education, Information Technology, Models
Peer reviewed Peer reviewed
Daugherty, Hubert; Cohn, Julie; Gorry, G. Anthony – Educause Quarterly, 2003
Provides examples of the need for enhanced streaming video in the greater Houston area, discussing how the EduPop router architecture meets this need by acting as a bridge for academic and commercial entities in the area. Catalogues the technological, organizational, and political challenges faced in implementing this architecture, offering a…
Descriptors: Computer Networks, Computer Uses in Education, Educational Technology, Higher Education
Peer reviewed Peer reviewed
Johnson, Worth – Educause Quarterly, 2003
Describes the wireless local area network (WLAN) at Simon Fraser University, British Columbia, Canada. Originally conceived to address computing capacity and reduce university computer space demands, the WLAN has provided a seamless computing environment for students and solved a number of other campus problems as well. (SLD)
Descriptors: Computer Uses in Education, Educational Environment, Educational Technology, Foreign Countries
Peer reviewed Peer reviewed
Yakovlev, Ilya V. – Educause Quarterly, 2002
Describes the reengineering of business practices that took place at the University of Wisconsin-Superior when they implemented an enterprise resource planning (ERP) system, PeopleSoft Student Administration (SA). Discusses lessons learned. (EV)
Descriptors: Change, College Administration, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
Ethridge, Robin R.; Hadden, Cynthia M; Smith, Michael P. – Educause Quarterly, 2000
Describes the Personal Access Web Services (PAWS) at Louisiana State University, a portal application which offers enterprise, workgroup, and personal services. The paper highlights: PAWS project planning; PAWS as a portal; PAWS implementation; account accreditation; user authentication; legacy integration; mapping credentials; transmission of…
Descriptors: Computer Uses in Education, Educational Technology, Higher Education, Information Technology
Peer reviewed Peer reviewed
Hanson, Mary – Educause Quarterly, 2001
Describes the role of information technology (IT) at the Massachusetts Institute of Technology, explaining that attention to the unique characteristics of an MIT education and incentives for sustainable change are central to its IT efforts. Discusses various IT initiatives, such as Project Athena, provision on campus, international efforts, and…
Descriptors: Computer Uses in Education, Educational Technology, Higher Education, Information Technology
Peer reviewed Peer reviewed
Ramsey, Ellen; Breeden, Sue Ellen; Roche, Gene; Evans, Susan T. – Educause Quarterly, 2001
Describes the two very different support and training models employed by the University of Virginia and the College of William and Mary in successfully confronting information technology challenges. (EV)
Descriptors: Computer Uses in Education, Differences, Higher Education, Information Technology
Peer reviewed Peer reviewed
McEuen, Sharon Fass – Educause Quarterly, 2001
Surveyed Southwestern University students about how fluent with information technology they see themselves. Found that students came to college equipped with basic skills in using e-mail, Internet browsing, and word processing, but lack experience with other contemporary skills such as working with spreadsheets and databases, networking, and…
Descriptors: College Students, Computer Literacy, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
Katz, Richard N.; Goldstein, Larry; Dobbin, Gregory – Educause Quarterly, 2001
Discusses the shifting focus regarding information technology in higher education from technology itself toward the people and business processes connected with it. Describes the University of California's efforts toward a new business architecture, and an Educause-sponsored forum on e-business discussing the same themes. Offers discussion of the…
Descriptors: College Administration, Computer Uses in Education, Educational Change, Higher Education
Peer reviewed Peer reviewed
Poindexter, Sandra; Basu, Choton; Kurncz, Steve – Educause Quarterly, 2001
Draws on the experience of Northern Michigan University's implementation of a mandatory laptop policy and offers practical guidelines for integration of technology in the classroom. Discusses a model with three components--technology, teamwork, and teaching--that helped faculty migrate to a new, more interactive teaching paradigm. (EV)
Descriptors: College Instruction, Computer Uses in Education, Higher Education, Instructional Innovation
Peer reviewed Peer reviewed
Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3