Networks / Servers

Thwarting ID Thieves

What most colleges and universities aren't doing to avoid identity theft and fraud--but should be.

American colleges and universities are breeding grounds for innovative ideas and open information sharing. Pair that with a large number of systems on a given network and a vulnerable student population with fresh credit and you've got an appealing target for identity thieves.

Office on the go

From facilities to IT to public safety, departments are equipping employees with mobile devices to work from anywhere on campus

Members of the facilities crew at Quinnipiac University were spending a lot of time traveling back to their shop during the workday.

This situation, of course, was not unique to Quinnipiac, but department officials at the school set out to eliminate the trips workers had to make to retrieve new work orders, find information about equipment in manuals or look up floor plans. The central Connecticut institution has a 212-acre main campus, and two branches that are a half-mile and about five miles away.

Embrace the Instability: Harnessing Innovative Technology Solutions Within an Institution Environment

At UBTech, Kevin Hayes, a Team Lead at Extended Campuses of Northern Arizona University, will discuss how his team developed a way to utilize innovative technologies without compromising their existing SIS. He will show a high level view of how EC built its tier-two system, its tier-one system and how it integrates with NAU’s SIS environment. This system was awarded a Model of Efficiency by the University Business Magazine.

Device Management Across the Network

A look at the modern network’s watchful eye, powered by tools to tag, clean, and clear devices used across campus for safe network access

How M.I.T. Ensnared a Hacker, Bucking a Freewheeling Culture

In the early days of 2011, the Massachusetts Institute of Technology learned that it had an intruder. Worse, it believed the intruder had been there before.

Read more »

Device Management Across the Network

A look at the modern network’s watchful eye, powered by tools to tag, clean, and clear devices used across campus for safe network access

College and university networks present opportunities to manage devices remotely, often automatically. Automating device management via the network saves students, faculty, and staff time and allows institutions to direct resources and efforts to the core business of higher education: learning.

Lone Star ahead of its class in information security

Community college system uses Verizon to upgrade IT infrastructure

Protecting any enterprise from security threats can be a daunting endeavor, but few organizational structures are more difficult to secure than a college or university. Students, faculty, administrators and alumni—each group has differing IT needs, creating not just one, but many unique security challenges.

Abilene Christian University Mobilizes Learning with Smartphones

ACU commits to mobile, delivers advanced applications supported by an Alcatel-Lucent network infrastructure

Integrating mobile devices in learning is getting to be old hat in Abilene, Texas.

As early as 2008, Abilene Christian University (ACU) was the first university in the United States to provide each incoming student with an Apple iPhone or iPod Touch. Each of the nearly 4,800 students on the ACU campus located 180 miles west of Dallas can access course calendars, campus maps, receive homework alerts, security alerts, and answer in-class surveys and quizzes, among other ACUdeveloped web applications.

Upgrading to the next generation of campus networks

Network building blocks support virtualization and mobile wireless today and for the next big thing

From BYOD environments to high bandwidth applications, there is intense pressure on network infrastructures. Upgrading is a high priority for higher education technology leaders. In this web seminar broadcast on September 20, an administrator from Gordon College in Wenham, Massachusetts described how the school faced those challenges head on when it embarked on a fourth-generation upgrade and redesign of its network to meet the changing demands of its users.

Pages