NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 13 results Save | Export
Hassler, Ardoth; Neuman, Michael – CAUSE/EFFECT, 1996
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
Descriptors: Check Lists, Computer Networks, Higher Education, Internet
Koopman, Ann – CAUSE/EFFECT, 1995
A key to successful implementation of a World Wide Web-based library information system is effective collaboration between campus library and information technology professionals, representing a long-term commitment to breakdown of organizational barriers, individual empowerment, and shared vision. The Web sites designed by Indiana…
Descriptors: College Administration, College Libraries, Comparative Analysis, Computer Networks
James, Thomas G.; Norwood, Bill R. – CAUSE/EFFECT, 1991
This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…
Descriptors: Banking, College Students, Computer Networks, Financial Services
Berge, Zane L., Ed.; Collins, Mauri P., Ed. – 1998
This four volume set in the series is designed especially for all members of the primary and secondary educational community, with chapter authors focusing on the pedagogical challenges in their various situations and writing about how computer-mediated communication (CMC) is used to address them. This series focuses on teaching and learning,…
Descriptors: Case Studies, Computer Assisted Instruction, Computer Mediated Communication, Computer Networks
Winborne, Duvon; And Others – 1990
This paper describes the District of Columbia's system for tracking at-risk and disabled infants during their first 3 years of life. The project involves a computerized system for following the developmental progress of at-risk infants identified at birth or other times. The project monitors the activities of children within various service…
Descriptors: Agency Cooperation, At Risk Persons, Child Development, Computer Networks
California State Dept. of Education, Sacramento. – 1994
This guide establishes statewide networking standards and addresses key issues regarding network implementation. It is designed to be a framework for construction of access to the global electronic highway for all California public schools. An in-depth view of the major areas that must be considered when schools are developing their technology…
Descriptors: Access to Information, Computer Networks, Cost Effectiveness, Educational Planning
Mid-Continent Regional Educational Lab., Aurora, CO. – 1998
The goal of this technology implementation workshop is to provide education leaders with frameworks, models, and processes for decision making in relation to technology implementation issues. The workshop components are based on a systems view of implementation comprised of Human Capacity Building, Technical Infrastructure, Organizational…
Descriptors: Computer Assisted Instruction, Computer Managed Instruction, Computer Networks, Computer Uses in Education
Technology & Innovations in Education, Rapid City, SD. – 1997
This Technology & Innovations in Education (TIE) workshop, presented in Kansas City, Missouri, on May 2, 1997, was designed to help participants gain a valid big picture of current school technology change issues, acquire current materials, clarify their beliefs, vision, and needs for their district's technology efforts, learn strategies for…
Descriptors: Computer Assisted Instruction, Computer Managed Instruction, Computer Networks, Computer Uses in Education
Graczyk, Sandra L. – 1987
Based on a doctoral dissertation that involved a study of the nation's 100 most successful school computer systems, this report summarizes the study's purpose, scope, methodology, resultant model, general observations, and future implications. The model is divided into two major sections: (1) strategic planning activities, focusing on computer…
Descriptors: Computer Networks, Computer Oriented Programs, Computer Uses in Education, Criteria
Technology & Innovations in Education, Rapid City, SD. – 1997
This Technology & Innovations in Education (TIE) workshop was presented on April 24 and 25, 1997, in Denver, CO, to help participants gain a big picture perspective of technology planning and related issues, understand a model for sound, practical technology planning, build capacity for leading a local planning effort, engage in the steps of…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Managed Instruction, Computer Networks
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Hahn, H. A.; And Others – 1989
The purpose of this handbook is to provide background and guidelines for course designers and instructional developers who will be developing Reserve Component training for the United States military using asynchronous computer conferencing techniques. The recommendations in this report are based on an international review of the literature in…
Descriptors: Computer Assisted Instruction, Computer Networks, Delivery Systems, Distance Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software