If you have any questions or comments about our webcasts please contact Mallory Bundy via email.
It’s human nature to ask ever bigger questions and strive to solve ever more complex problems. High Performance Computing (HPC) is one more technological tool that can help us in that quest. HPC is pushing innovation of the next amazing achievement in science, engineering, healthcare, and education.
Time: 11:00 AM PT
People frequently asked the Information Resources and Planning (IRP) Department at the University of Texas at El Paso (UTEP) which Student Response System (SRS) it supported. At the time, there wasn’t a designated standard. This resulted in numerous solutions in use on UTEP’s campus—often forcing students to purchase (and learn how to use) multiple subscriptions or hardware devices.
The virtualization of college computer labs has been a widespread development the past few years. The growing availability of software applications is transforming classrooms and laboratories into digital learning environments fulfilling the consumer-like experience students are seeking by providing 24/7 access to digital labs and learning environments anywhere on any device.
From lecture capture and flipped classrooms to student presentations and events, video has become central to higher ed learning. Listen as three academic technologists discuss best practices and considerations for successfully using video at scale.
Migrating to a new LMS is a massive ordeal, but totally worth it to best meet the needs of faculty and students. Listen as two administrators discuss how they’ve successfully migrated systems, including why and how they did it, and lessons learned.
Open-source Moodle, already the most widely used LMS in the world, is continuing to gain traction. Join us to explore how Moodle has impacted the LMS market and continues to be a pioneer in emerging LMS technologies.
Building the right infrastructure to access and protect restricted research data is not just a science but an art form.
Campuses are particularly vulnerable to security threats given their open network architectures and the sheer number of users they serve. While dealing with a steady stream of attacks can be resource intensive, searching for and hunting down data from different systems can be time consuming.