US Canada China
Search
Back 

Blog

Thursday, January 28, 2016

28

Jan

2016

The power of Predictive Analytics

The Power of Predictive Analytics – Universities are turning to new data sources to identify those students who need a nudge toward success.  The promise of predictive analytics in higher education continues to entice--for good reason, it can change student and University outcomes.

In this discussion we will look at why most institutions are struggling to leverage the traditional data points they gather about students - let alone the other data sources needed to ensure actionable insights around student attraction, progression and retention. Second, we will examine why a data mix that works at one school may not be relevant at another, making it almost impossible to buy an effective packaged solution off the shelf – discussion will center on what options are available. Finally, the creepiness factor - Just how intrusive can schools be in tracking the actions of their students?  We will discuss how to protect student level data.

Or find out more at the Association of Collegiate Computing Services of Virginia

Annual Conference: March 16 - 18, 2016
http://accs2016.sched.org/event/5fHi

Number of views (4424) Article rating: 2.0

Tuesday, January 19, 2016

19

Jan

2016

5 Steps to an Effective Disaster Recover Plan

Nearly three out of four organizations are at risk of failing to recover from a disaster or outage. Two thirds say their disaster recover (DR) planning did not prove useful in their worst event. Most have not documented their DR plans, have not established key metrics such as Recovery Time Objectives, Recovery Point Objectives, failover, or failback processes. Those are the disconcerting results of a survey conducted by the Disaster Recovery Preparedness Council. 

You know how important your systems are to your operation so if you fall into one of those categories, it’s time to do something about it. Here is a five-step plan to get you started on developing an effective DR plan.

1. Inventory your applications and services
As a first step, you need to understand what applications and services you are going to protect under your DR plan. Begin with mission critical apps that control your financial and business processes and then move on to others that are necessary to keep your ongoing business operations up and running. After identifying these critical elements, assign priority levels to each.
Number of views (4764) Article rating: No rating
Read more

Categories: TIG Blog

Tags:

RSS

TIG is a single source IT solutions provider for businesses and organizations of all sizes.

TIG shares with its clients the strength of over 33 years of computer system integration experience and hundreds of long-term manufacturer alliances.


Quick Links

Copyright 2017 by Technology Integration Group