The intrusion last month into Vice Presidential candidate Sarah Palin's e-mail highlighted the frailty of some types of data security measures. What are the lessons for the rest of us?
Electronic procurement can impact much more than simple transactions and individual business functions. John Mayes examines how institutions can gain competitive edge with an effective procurement strategy.
Blogging can be an effective tool for learning, but its benefits shouldn't be taken for granted. It takes careful planning and skillful management to make it work in an educational setting. Here are five of the most common mistakes for instructors to avoid when incorporating blogs into instruction.
8 best practices for providing the help online faculty need-- when they need it.
One month after our previous "Cheapskate's Guide" to essential security tools, "free" is still alive and well. Security experts have weighed in with additional open source and free software packages they find particularly useful, which we now share with you.
Free is an attractive price. Read which packages were deemed "most useful" by a handful of experts.
For more than twenty years, we educational technologists have talked about "integrating information technology into higher education." The implication was that education would stay the same and information technology would benignly slip in and cause no ruckus at all. This rhetoric no longer applies, if it ever did, and does a disservice to us as we work through the intricacies of this age.
The hackneyed advice from IT consultants and columnists is that security is all about risk management. But do our traditional measurements of risk reflect reality?
A recently retired CIO reflects on a new "socially conscious" way to do business.
The changes and challenges that new technology has brought to teaching and learning are well documented. New technology has changed how people receive, understand, and apply new information and ultimately has changed student expectations and thinking skills.