Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Weiss, Andrew M. – MultiMedia Schools, 1995
Presents planning guidelines for wiring specifications for K-12 schools by reviewing advantages and disadvantages of using copper, fiber-optic, and coaxial wire. Addresses the future of network wiring and educational technology, and makes recommendations. A sidebar describes the physical appearance of different types of wire and a table compares…
Descriptors: Comparative Analysis, Computer Networks, Educational Facilities Planning, Educational Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy