NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Raths, David – Campus Technology, 2013
With the exception of a plague of locusts, it seems as if the past five years have thrown every imaginable challenge at IT--from the incredible shrinking budget to BYOD and now the MOOC monster. For those of a superstitious bent, these were probably just appetizers to the crises that will inevitably accompany a year featuring the number 13 (cue…
Descriptors: Prediction, Trend Analysis, Information Technology, Campuses
Fredette, Michelle – Campus Technology, 2013
For colleges and universities today, the question is no longer whether to develop a campus app or not. Instead, the debate has shifted to the best--and most cost-efficient--way to make campus applications accessible to the myriad devices and operating systems out there. Schools have a few options: They can develop multiple native app versions;…
Descriptors: Web Browsers, Computer Software Evaluation, Computer Software Reviews, Technology Planning
Waters, John K. – Campus Technology, 2013
The latest data alert: By 2020, the amount of data generated daily will reach 40 zettabytes, or roughly 5,247 gigabytes for every person on earth. That's one of the findings in a new report published by IT industry analysts at IDC. The study casts doubt on the ability to capture the value of all this data, especially since schools barely tapped…
Descriptors: Information Management, Data, Data Collection, Data Processing
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Waters, John K. – Campus Technology, 2012
Colleges and universities are swimming in an ever-widening sea of data. Human beings and machines together generate about 2.5 "quintillion" (10[superscript 18]) bytes every day, according to IBM's latest estimate. The sources of all that data are dizzyingly diverse: e-mail, blogs, click streams, security cameras, weather sensors, social networks,…
Descriptors: Electronic Publishing, Data, Information Utilization, Information Management
Schaffhauser, Dian – Campus Technology, 2012
Half of servers in higher ed are virtualized. But that number's not high enough for Link Alander, interim vice chancellor and CIO at the Lone Star College System (Texas). He aspires to see 100 percent of the system's infrastructure requirements delivered as IT services from its own virtualized data centers or other cloud-based operators. Back in…
Descriptors: Misconceptions, Technology Planning, Best Practices, Technology Uses in Education
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering