Industry Report

Career College Central Summary:

  • Bill Gates addressed the business officers of colleges and universities Monday at the annual meeting of the National Association of College and University Business Officers in Seattle.
  • He began from the premise that “all lives have equal value” and that the United States stands for equal opportunity.expects to see major innovation in the delivery of instruction and the support systems which colleges provide to students...

Career College Central Summary: 

  • Nearly one million community college students in 30 states – 8.5 percent of community college students nationally – were enrolled in schools that blocked all of their students’ access to federal student loans. 
  • In 11 states, more than 10 percent of community college students lacked access to federal loans, and in seven states more than 20 percent lacked access. 
  • Community college...

Career College Central Summary:

  • Kent Jenkins is spokesman for Corinthian Colleges. He says both Corinthian and the U.S. Department of Education want no disruption for students during the sale. "Students are in class. Faculty and staff are at work," he says.
  • Jackiea Arnold, 30, is halfway through her dental assistant program. She says when she first heard the Everest Institute was for sale she was nervous. "I'm really not a school person, so once...

Career College Central Summary:

  • Bauder was founded in 1964 as a fashion and etiquette school.
  • The college is regionally accredited by the Southern Association of Colleges and Schools.
  • The school’s closing is not prompted by any federal or state investigations that have plagued other for-profit institutions.
  • Most of Bauder’s students will be able to complete their course work by the December 2015 closing. The remaining 75 or so...

Career College Central Summary:

  • 10 "top" technologies and approaches security professionals should consider adding to their security portfolios:
  1. Cloud access security brokers;
  2. Adaptive access control;
  3. Pervasive sandboxing;
  4. Endpoint detection and response;
  5. Big data security analytics;
  6. Machine-readable threat intelligence;
  7. Software-defined security;
  8. Isolation and...