Free is an attractive price. Read which packages were deemed "most useful" by a handful of experts.
For more than twenty years, we educational technologists have talked about "integrating information technology into higher education." The implication was that education would stay the same and information technology would benignly slip in and cause no ruckus at all. This rhetoric no longer applies, if it ever did, and does a disservice to us as we work through the intricacies of this age.
The hackneyed advice from IT consultants and columnists is that security is all about risk management. But do our traditional measurements of risk reflect reality?
A recently retired CIO reflects on a new "socially conscious" way to do business.
The changes and challenges that new technology has brought to teaching and learning are well documented. New technology has changed how people receive, understand, and apply new information and ultimately has changed student expectations and thinking skills.
Semantics is a sub-field of linguistics that focuses on meaning making in language. Therefore, the Semantic Web we're still reaching for will be based on a set of definitions, languages, and standards that can base a search on the detection of meaning and not just on a simple character string. The Semantic Web will at least be smarter than the current Web.
At a time when the most startling and exciting learning environments are being created in Web 2.0, the computing establishment on campus has enough to do just to keep the big pipes and big iron running. Innovation in learning around technology, therefore, needs a separate administrative support structure and a top-level advocate who reports in parallel to central computing.
Who is qualified to conduct computer forensics: computer jocks or private eyes? A number of states are answering that question private investigators. Read on to see what this may mean to your campus.
The lure of automating workflow online so human intervention is minimized is continually reinforced in the minds of higher education administrators by examples of automated campus systems such as financials, student information systems, and other enterprise systems. But what's good for management is not always good for learning.
Adding to the slew of data security issues already plaguing college and university campuses is an onslaught of stealth malware and botnet attacks. What's a beleaguered network manager to do? Here, from UC-Berkeley's own network pro, a cache of helpful advice.