Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Networks | 12 |
Higher Education | 12 |
Computer Security | 8 |
Information Technology | 8 |
Internet | 7 |
Computer Uses in Education | 4 |
Educational Technology | 4 |
Telecommunications | 4 |
Campuses | 3 |
Computers | 3 |
Handheld Devices | 3 |
More ▼ |
Source
Campus Technology | 12 |
Author
Villano, Matt | 3 |
Panettieri, Joseph C. | 2 |
Chretien, Wendy | 1 |
Demski, Jennifer | 1 |
Gale, Doug | 1 |
Poremba, Sue Marquette | 1 |
Schaffer, Greg | 1 |
Zeltser, Lenny | 1 |
Publication Type
Journal Articles | 12 |
Reports - Descriptive | 12 |
Education Level
Higher Education | 12 |
Postsecondary Education | 3 |
Audience
Location
Ohio | 2 |
Pennsylvania | 2 |
Colorado | 1 |
Georgia | 1 |
Indiana | 1 |
Louisiana | 1 |
Massachusetts | 1 |
Michigan | 1 |
New York | 1 |
South Carolina | 1 |
Texas | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Villano, Matt – Campus Technology, 2010
If a school is seeking to incorporate more collaborative approaches to teaching and learning, the design of the learning environment--whether it's a classroom or a more informal space--can be a critical factor in making this transformative move. Technology, in particular, can play a pivotal role in enabling students to work effectively in teams…
Descriptors: Cooperative Learning, Teacher Collaboration, Educational Facilities Improvement, Educational Facilities Planning
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Campus Technology, 2008
This article features the 14 winners of the 2008 Campus Technology Innovators. This article offers an insider's view of the winners' campus technology initiatives, their project leads, and vendor partners jointly recognized for a unique ability to advance teaching, learning, administration, and operation on North American college and university…
Descriptors: Emergency Programs, Computer Uses in Education, Educational Innovation, Higher Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering