Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Library Taxonomy
We Built, We Bought, We Shared: The Costs of Administrative Service Systems vs. the Academic Mission, EDUCAUSE Review, July 2014. In this article, CIOs talk candidly about three strategies: building-your-own in the modern era; buying and implementing in smarter ways; and joining a higher education consortium that shares processes and software.
2013 CDS Executive Summary Report February 2014. This report provides higher education CIOs and senior IT leaders with the benchmarks they need to make strategic decisions about IT at their institutions. Each year, more than 750 institutions (both within and outside the United States) participate in a survey about IT financials, staffing, and services. This report provides a glimpse into the breadth of CDS data and summarizes the most important findings from this year’s survey.
Technology and the Broken Higher Education Cost Model: Insights from the Delta Cost Project, September 5, 2012. The Delta Cost Project has drawn attention to the need for a new focus on institutional spending and has provided a number of useful metrics for thinking about how different types of institutions spend money, about the relationships between costs and revenues, and about the declining public subsidies in public higher education.
The EDUCAUSE 2011 Core Data Service Report: Highlights and Insights into Higher Education Information Technology, January 2012. "The IT Organization, Budgets, and Funding" chapter provides statistics on where IT funding sources are from and what the budget is being spent on.
Expert Discussion Session: Unexpected Outcomes from the Cost-Cutting Era. EDUCAUSE 2011 presentation. Two CIOs share their experiences and some of the outcomes from these belt-tightening measures.
Funding-Model Archetypes for Central Information Technology Functions. ECAR research bulletin, January 2012. This CDS Spotlight ECAR research bulletin focuses on EDUCAUSE Core Data Service survey results related to funding models for IT functions.
Library Items on this Topic
EDUCAUSE Library Items for IT Funding
- IT Security Questionnaire/IT Standards and Requirements Questionnaire
July 14, 2014
The University of Missouri IT Standards and Requirements Questionnaire (ITSRQ), currently in draft form, is predominantly focused on SaaS solutions although it can be readily adapted for other pu…
- Browsing the Web More Securely and More Privately With Firefox On Your Mac
April 28, 2014
This document is meant to help moderately technical users who are security- and privacy-focused make progress toward achieving online security and privacy goals when using an Apple Mac with the M…
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- DNSSEC with BIND 9.8.0
May 4, 2011
This blog posting gives directions for upgrading from an older version of BIND. This blog posting gives directions for upgrading from an older …
- Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
- Tool Guide Series on DNSSEC Version 1 - February 2010
July 26, 2010
The intent of this document is to provide an overview of the DNSSEC-related Open Source tools and automation suites available in the industry to DNS operators who wish to DNSSEC-enable their oper…
- Businesses Confront the Cloud Security Threat
June 17, 2010
As they embrace the cloud, companies remain skittish about entrusting data and computing tasks to outside vendors. Proposed solutions abound. As …
- NIST Secure Domain Name System (DNS) Deployment Guide
February 18, 2009
This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data pertaining to publicly acces…
- DNSSEC Deployment Initiative Roadmap
February 12, 2005
This road map describes the basic goal for deployment; the current state of practice, gaps and barriers; a set of sequences and dependencies; and next steps. Its primary audience consists of oper…
- Top 10 Threats to Computer Systems Include Professors and Students
December 17, 2008
College network security staff are findign the weakest part of a campus network is the users, including professors and students, who carelessly give out their passwords or leave important informa…