Dan Hofmann has been working for years to make parking about more than just painted lines, structures, and tickets. From city government positions to parking operations management at Harvard University to his current role as director of parking and transportation services at Clemson University (S.C.), he has been a champion for parking efficiencies. It wouldn’t be a stretch to say he makes parking cool.
Has college tuition begun to go the way of Walmart-style pricing? College administrators are experimenting with cut-rate models by freezing tuition, slashing sticker prices, and rolling back tuition, driven to discover a way to tip the scales toward enrollment growth. So far, results are mixed. Also, the excitement of experimentation is being tempered by the uncertainty of the current college marketplace.
When a student starts tweeting expletives about your institution for the whole world to potentially see, it’s probably time to find out the reason for the lash out and do some damage control.
Beverly Low, dean of first-year students at Colgate University in New York, reached out to one such student and ended up having three meetings with her. “They were meaningful conversations, too,” Low says, adding that the student was more likely to come and talk in person than vent on social media in the future.
The lone-wolf hacker creating nuisance viruses in a basement has been replaced by sophisticated foreign governments and organized crime rings as the top cybersecurity threat to colleges and universities.
Today’s hackers are now being deployed around the clock to steal intellectual property, sensitive research, and personal information, potentially costing colleges and universities millions of dollars and badly damaging their reputations.
The intensification of cyberattacks against universities and colleges means institutions need more than just clever passwords and the latest antivirus software to protect themselves from today’s more powerful hackers.
There are a wide variety of products that can automatically control who’s using a network, determine what kind of security their devices have, and even fool hackers into thinking they have successfully infiltrated a computer system.