Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 41 - 50 of 97 Results

Sort by:

Enterprise WAN Capacity Planning
March 28, 2008

Capacity planning or capacity management isn't just for networks anymore. In fact, while enterprise wide area networks (WANs) were once only optimized for transaction processing, it is now …

Higher Education IT and Cyberinfrastructure: Integrating Technologies for Scholarship
June 10, 2008

Abstract This 2008 ECAR research study explores higher education’s involvement in five areas of research-related information technologies: high-performance computing resources, cyberinfras…

ITIL Service Management Practices: Third Time's the Charm
July 7, 2008

Since its inception, the Information Technology Infrastructure Library (ITIL) has remained the most widely recognized and adopted framework for IT service management. The many benefits of ITIL h…

Process and Politics: IT Governance in Higher Education
July 21, 2008

Abstract This 2008 ECAR research study examines the extent of participation in IT governance by campus leaders and constituents; the use of IT governance mechanisms such as IT steering committ…

Deciphering Social Networks
September 2, 2008

Adoption and usage data regarding social networking trends by consumers has convinced many business and IT leadership teams that social network sites, and their technological underpinnings, can …

Leading the IT Workforce in Higher Education
September 12, 2008

Abstract This 2008 ECAR research study builds upon the work done in 2004 by ECAR in its original study of information technology leadership. The 2008 study addresses the following questions: …

The ECAR Study of Undergraduate Students and Information Technology, 2008
October 21, 2008

Abstract This 2008 ECAR research study is a longitudinal extension of the 2004, 2005, 2006, and 2007 ECAR studies of students and information technology. The study is based on quantitative d…

Virtualization from the Security Practitioner's Point of View
January 22, 2009

x86 virtualization is a popular new concept and architecture for today's enterprise IT environments. Not only does it provide for flexibility and timelessness in technology, but it also pro…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Spreading the Word: Messaging and Communications in Higher Education
March 31, 2009

Abstract This 2009 ECAR research study is a comprehensive analysis of how colleges and universities plan, organize, deploy, and support messaging and communication technologies. It provides …