Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 11 - 20 of 24 Results

Sort by:

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Practical Strategies for Managing Risk in Cloud Computing
March 1, 2011

This ECAR research bulletin identifies some key principles on which to base decisions related to security assurance and compliance capabilities in cloud computing environments. It also illustrate…

Managing Availability and Performance Risks in the Cloud: Expect the Unexpected
December 7, 2010

We know that the best way to avoid cloud risks is to apply sound risk management strategies before placing applications and IT services in the cloud. Some risks, however, cannot be predetermined …

New Directions in Federation
November 16, 2009

Federation technology has become a very important connective technology that enables efficient distributed identity management (IdM) and enhanced convenience for users. The trend toward outsource…

Developing a Coherent Cyberinfrastructure from Local Campuses to National Facilities: Challenges and Strategies
April 2, 2009

This report summarizes the observations and recommendations from a workshop in July 2008 sponsored by the EDUCAUSE Net@EDU Campus Cyberinfrastructure Working Group (CCI) and the Coalition for Aca…

Virtualization from the Security Practitioner's Point of View
January 22, 2009

x86 virtualization is a popular new concept and architecture for today's enterprise IT environments. Not only does it provide for flexibility and timelessness in technology, but it also pro…

Securing "Web 2.0" Technologies
May 15, 2007

Web 2.0 applications, especially client-side processing, Extensible Markup Language (XML) syndication, mashups and shared content, and social networking, bring unique vulnerabilities to our inst…

What Do Researchers Need? Higher Education IT from the Researcher’s Perspective
August 17, 2006

Research methods, research subjects, the composition of research teams, and collaborative practices have all been affected in ways that are important to those who manage research and information …

The Auditor’s Dilemma: Audit Issues for Higher Education in the Information Age
May 23, 2006

May 23, 2006, presentation to the Big 12 Auditors. May 23, 2006, presentation to the Big 12 Auditors. …

Digital Content Delivery
December 8, 2005

Presentation at the December 2005 ECAR Symposium in Carefree, Arizona. Within the context of digital content management, digital content delivery focuses on how digitized or "born digital&qu…