NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Ford, Tracy – Campus Technology, 2012
Many institutions implement a distributed antenna system (DAS) as part of a holistic approach to providing better wireless coverage and capacity on campus. A DAS provides wireless service within a particular area or structure via a network of separate antenna nodes that are connected to a common source through fiber or coaxial cable. Because DAS…
Descriptors: Technology Planning, Information Networks, Systems Development, Computer Networks
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Cismaru, Romulus; Cismaru, Magdalena – Journal of College Teaching & Learning, 2011
Laptop use in class is a characteristic of universities that is changing rapidly. Although much of the attention and research regarding this issue has focused on the debate of whether to impose mandatory laptop programs, the reality of wireless campuses allows students to use their laptops in class for class related and non-class related…
Descriptors: Student Attitudes, Universities, Laptop Computers, Foreign Countries
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Ricart, Glenn – EDUCOM Review, 1993
Provides technical recommendations for wiring of college campuses to provide for current and future computer network needs, considering wiring in and between existing and new buildings. The effects of trends in networking costs are discussed. The importance of higher education's involvement and influence in various information technology issues is…
Descriptors: Campuses, Computer Networks, Costs, Higher Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Utah State Univ., Logan. – 1991
The Blue Ribbon Committee at Utah State University (USU) was charged with the study of information systems, telecommunications, and library services at the university, and challenged to look for ways to better manage, coordinate, and capitalize on both opportunity and investment in telecommunication and information technology and resources. The…
Descriptors: Administration, Campuses, Change Strategies, College Libraries