A disciplined approach to risk management can help you prepare for the worst and prevent unexpected problems from derailing your project.
Students and faculty may love them, but IT personnel get a major headache when they try to integrate Apple tablets--and the company's TV technology--in an enterprise setting.
To protect sensitive data in the BYOD era, schools must take a more closed, corporate approach, blending network access control and mobile device management.
LSCS aims to improve student completion rates for its on-campus and distance learning students by migrating to a new learning management system.
CT asked four security experts for their tips and best practices for staying ahead of security threats on campus.
When it comes to secure testing online, even high-tech solutions rely on an old standby: a human proctor. But is such an approach sustainable in the long run?
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. CT looks at the 4 biggest security worries--and how IT can fight back.
In a Q&A, authors Frank McCluskey and Melanie Winter discuss how the forces that have brought about the current crop of challenges in higher education are the same ones that can help solve them.
Moving to the cloud can help schools boost collaboration among students, faculty, and staff--while still cutting costs. CT looks at 3 cloud-based tools that can make a difference.
Recognizing mobile technology's ubiquity and reach into students' lives, its rapid technical evolution, and its unique transformative potential for education, the Tennessee Board of Regents has included mobilization as an important part of its strategic plan. As Associate Vice Chancellor for Mobilization and Emerging Technology, Robbie Melton oversees mobilization strategies and initiatives for TBR. Here, Melton shares how she works to build and extend TBR's model for strategic mobilization.