NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Ford, Tracy – Campus Technology, 2012
Many institutions implement a distributed antenna system (DAS) as part of a holistic approach to providing better wireless coverage and capacity on campus. A DAS provides wireless service within a particular area or structure via a network of separate antenna nodes that are connected to a common source through fiber or coaxial cable. Because DAS…
Descriptors: Technology Planning, Information Networks, Systems Development, Computer Networks
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Raths, David – Campus Technology, 2010
Many chief information officers (CIOs) have come to accept and even embrace the role of outsourcers in their portfolio of IT services. In 2009, 47 percent of the 352 CIOs surveyed by the Center for Higher Education Chief Information Officer Studies (CHECS) said they had selectively outsourced some part of the IT function, up from 43 percent the…
Descriptors: Higher Education, Information Technology, Outsourcing, Strategic Planning
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Panettieri, Joseph C. – Campus Technology, 2008
Despite the hype, IP convergence does not happen overnight. Navigating the IP convergence market is not easy. Some network equipment makers are taking traditional voice over IP (VoIP) product lines and rebranding them as unified communications offerings. But beware: While closely related, VoIP and UC are not the same. Generally speaking, VoIP…
Descriptors: Computer Networks, Information Networks, Computer Mediated Communication, Free Enterprise System
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Villano, Matt – Campus Technology, 2008
Wikis and blogs may be today's Web 2.0 darlings, but forward-looking institutions are going after the next big thing: collaboration in real time. As mainstream technology has advanced and the cost of web conferencing has dropped, a growing number of institutions are finding creative ways to achieve synchronous collaboration. What's more, the…
Descriptors: Web Sites, Information Technology, Synchronous Communication, Computer Mediated Communication
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering