NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 29 results Save | Export
Fredette, Michelle – Campus Technology, 2013
IT's tough being a digital sign these days. Everyone wants a piece of action. From announcements to advertisements, menus to broadcasts, digital signs provide dynamic messaging tailored to locations and circumstances. With the advent of wayfinding technology, today's digital signs can serve up customized directions around campuses and all of…
Descriptors: Campuses, Geographic Information Systems, Technology Planning, Navigation
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Raths, David – Campus Technology, 2013
With the exception of a plague of locusts, it seems as if the past five years have thrown every imaginable challenge at IT--from the incredible shrinking budget to BYOD and now the MOOC monster. For those of a superstitious bent, these were probably just appetizers to the crises that will inevitably accompany a year featuring the number 13 (cue…
Descriptors: Prediction, Trend Analysis, Information Technology, Campuses
Demski, Jennifer – Campus Technology, 2012
When it comes to project management, the IT department is typically its own worst enemy. When project requests are pushed through the budgeting process by different departments, it's up to IT to make them all work. The staff is required to be "heroic" to get the project load done. People get to work over weekends and postpone their vacations. The…
Descriptors: Program Administration, Change Strategies, Organizational Change, Performance Technology
Fredette, Michelle – Campus Technology, 2013
For colleges and universities today, the question is no longer whether to develop a campus app or not. Instead, the debate has shifted to the best--and most cost-efficient--way to make campus applications accessible to the myriad devices and operating systems out there. Schools have a few options: They can develop multiple native app versions;…
Descriptors: Web Browsers, Computer Software Evaluation, Computer Software Reviews, Technology Planning
Waters, John K. – Campus Technology, 2013
The latest data alert: By 2020, the amount of data generated daily will reach 40 zettabytes, or roughly 5,247 gigabytes for every person on earth. That's one of the findings in a new report published by IT industry analysts at IDC. The study casts doubt on the ability to capture the value of all this data, especially since schools barely tapped…
Descriptors: Information Management, Data, Data Collection, Data Processing
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Laster, Stephen – Campus Technology, 2011
This column explores the world of Gene, a composite CIO who leads a sizable IT organization for a top 100 university somewhere in America. The author's goal is to help him navigate the tough times ahead of higher education IT. The author peeks into Gene's daily goings-on, investigates his problems, and helps him to not only survive, but prosper.
Descriptors: Higher Education, Performance Technology, College Planning, Technology Planning
Schaffhauser, Dian – Campus Technology, 2012
Half of servers in higher ed are virtualized. But that number's not high enough for Link Alander, interim vice chancellor and CIO at the Lone Star College System (Texas). He aspires to see 100 percent of the system's infrastructure requirements delivered as IT services from its own virtualized data centers or other cloud-based operators. Back in…
Descriptors: Misconceptions, Technology Planning, Best Practices, Technology Uses in Education
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Ramaswami, Rama – Campus Technology, 2008
Human Resources (HR) administrators are finding that as software modules are installed to automate various processes, they have more time to focus on strategic objectives. And as compliance with affirmative action and other employment regulations comes under increasing scrutiny, HR staffers are finding that software can deliver and track data with…
Descriptors: Higher Education, Human Resources, Management Information Systems, Automation
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Schaffhauser, Dian – Campus Technology, 2008
Data loss from life's little power calamities may be the most common form of IT disaster any campus can face. According to a 2007 industry association survey(www.connect.educause.edu/library/ecar/shelterfromthestormitandb/41174), 82 percent of higher education institutions reporting a disruptive occurrence in the five years prior to the study…
Descriptors: Higher Education, Computer Security, Troubleshooting, Technical Support
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Previous Page | Next Page ยป
Pages: 1  |  2