Main Nav

Search results

Showing 11 - 20 of 74 Results

Sort by:

AT&T Splits Phones into Work and Personal Partitions, on any Carrier
June 15, 2012

AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology…

7 Ways BYOD Could Get You Sued
July 18, 2012

The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012

Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…

Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012

Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…

Getting Schooled on BYOD at Utah Valley University: Lessons Learned
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

This session will focus on how Utah Valley University overcame significant challenges to create a BYOD environment that integrates mobility into the university experience for more than 40,000 stude…

Multiple Devices and Platforms: Institutional Strategies
May 17, 2012

This CNI’s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops a…

Podcast: Jodi Ito on the Information Security Program at the University of Hawaii
January 20, 2012

Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university's new information security…

January is Data Privacy Month: Free Webinars and Easy Ways to Increase Awareness
December 7, 2011

You know the importance of protecting personal identities and the effects social media can have on privacy, but does everyone on your campus? During the month of January, EDUCAUSE is expanding o…

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.