Viewpoint


Just-in-Time Support

8 best practices for providing the help online faculty need-- when they need it.

Cheapskate 2: The Sequel

One month after our previous "Cheapskate's Guide" to essential security tools, "free" is still alive and well. Security experts have weighed in with additional open source and free software packages they find particularly useful, which we now share with you.

A Cheapskate's Guide to Free Security Software

Free is an attractive price. Read which packages were deemed "most useful" by a handful of experts.

It IS about Technology: Integrating Higher Ed into Knowledge Culture

For more than twenty years, we educational technologists have talked about "integrating information technology into higher education." The implication was that education would stay the same and information technology would benignly slip in and cause no ruckus at all. This rhetoric no longer applies, if it ever did, and does a disservice to us as we work through the intricacies of this age.

The Myth and Reality of Risk

The hackneyed advice from IT consultants and columnists is that security is all about risk management. But do our traditional measurements of risk reflect reality?



A New Form of Business for a New, Socially Conscious World

A recently retired CIO reflects on a new "socially conscious" way to do business.

The Evolution of Digital Learning Systems Through Customization

The changes and challenges that new technology has brought to teaching and learning are well documented. New technology has changed how people receive, understand, and apply new information and ultimately has changed student expectations and thinking skills.

Semantic Search: Could the Web Think?

Semantics is a sub-field of linguistics that focuses on meaning making in language. Therefore, the Semantic Web we're still reaching for will be based on a set of definitions, languages, and standards that can base a search on the detection of meaning and not just on a simple character string. The Semantic Web will at least be smarter than the current Web.

The Next Phase for Academic Computing

At a time when the most startling and exciting learning environments are being created in Web 2.0, the computing establishment on campus has enough to do just to keep the big pipes and big iron running. Innovation in learning around technology, therefore, needs a separate administrative support structure and a top-level advocate who reports in parallel to central computing.

Mickey Spillane Versus Wiley Hacker

Who is qualified to conduct computer forensics: computer jocks or private eyes? A number of states are answering that question private investigators. Read on to see what this may mean to your campus.