Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 41 - 50 of 96 Results

Sort by:

Combining Data Center Consolidation and Server Virtualization: The Path to Nirvana or the Road to Hell?
March 30, 2010

IT organizations combining data center consolidation and server virtualization must understand how the sequence of consolidation operations (i.e., server virtualization before, during, or after d…

Institutional Data Management in Higher Education
December 1, 2009

Abstract This 2009 ECAR study of institutional data management examines the policies and practices by which higher education institutions effectively collect, protect, and use digital informat…

New Directions in Federation
November 16, 2009

Federation technology has become a very important connective technology that enables efficient distributed identity management (IdM) and enhanced convenience for users. The trend toward outsource…

The ECAR Study of Undergraduate Students and Information Technology, 2009
October 22, 2009

Abstract Since 2004, the annual ECAR Study of Undergraduate Students and Information Technology has sought to shed light on how information technology affects the college experience. We …

Alternative IT Sourcing Strategies: From the Campus to the Cloud
August 20, 2009

Abstract This 2009 ECAR research study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies and servic…

Cloud Storage: An Emerging Market
August 4, 2009

Driven by the need to reduce costs and to provide dependable data delivery and protection, the cloud storage pay-as-you-go service model offers information technology a new way to avoid building…

Spreading the Word: Messaging and Communications in Higher Education
March 31, 2009

Abstract This 2009 ECAR research study is a comprehensive analysis of how colleges and universities plan, organize, deploy, and support messaging and communication technologies. It provides …

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Virtualization from the Security Practitioner's Point of View
January 22, 2009

x86 virtualization is a popular new concept and architecture for today's enterprise IT environments. Not only does it provide for flexibility and timelessness in technology, but it also pro…

The ECAR Study of Undergraduate Students and Information Technology, 2008
October 21, 2008

Abstract This 2008 ECAR research study is a longitudinal extension of the 2004, 2005, 2006, and 2007 ECAR studies of students and information technology. The study is based on quantitative d…