Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Networks | 12 |
Information Technology | 10 |
Vendors | 7 |
Internet | 5 |
Online Vendors | 5 |
Computer Security | 4 |
Higher Education | 4 |
Computer Mediated… | 3 |
Educational Technology | 3 |
Information Networks | 3 |
Technology Planning | 3 |
More ▼ |
Source
Campus Technology | 3 |
ProQuest LLC | 2 |
T.H.E. Journal | 2 |
Computers in Libraries | 1 |
EDUCAUSE Quarterly | 1 |
Information Systems Education… | 1 |
Issues in Science and… | 1 |
Journal of Web Librarianship | 1 |
Author
Panettieri, Joseph C. | 3 |
Aber, Susan Ward | 1 |
Beer, Robert | 1 |
Bonneau, Thomas | 1 |
Henninger, Jessamyn | 1 |
Hodgins, Dave | 1 |
Hughes, Joy R. | 1 |
Lawrence, Peg | 1 |
Liu, Yipeng | 1 |
Marchant, Robert L. | 1 |
Raths, David | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 9 |
Dissertations/Theses -… | 2 |
Reports - Research | 1 |
Education Level
Higher Education | 6 |
Elementary Secondary Education | 2 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
Colorado | 1 |
Indiana | 1 |
Maryland | 1 |
Massachusetts | 1 |
Minnesota | 1 |
Mississippi | 1 |
New York | 1 |
North Carolina | 1 |
Ohio | 1 |
South Africa | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vigil-Hayes, Morgan Ashlee – ProQuest LLC, 2017
The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…
Descriptors: Internet, Computer Networks, Social Networks, Access to Information
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Schaffhauser, Dian – T.H.E. Journal, 2012
This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…
Descriptors: Consortia, Elementary Secondary Education, Needs Assessment, Online Vendors
Henninger, Jessamyn; Aber, Susan Ward – Issues in Science and Technology Librarianship, 2010
Systems Architects and Information Technology administrators working in higher education help faculty, staff, and student computer users. Yet, who helps them? What resources do these professionals value? A case study was conducted using purposeful sampling and data collection through electronic interview to gather the preferred information-seeking…
Descriptors: Information Technology, Administrators, Higher Education, Resources
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Lawrence, Peg – Computers in Libraries, 2009
In these days of distance learners, virtual libraries, and electronic information, no library can be without some way of providing remote access to affiliated users, whether they are distance students, online students, or local students and faculty members working from home. Libraries subscribe to any number of electronic resources and journals,…
Descriptors: Electronic Publishing, Electronic Equipment, Electronic Libraries, Information Technology
Panettieri, Joseph C. – Campus Technology, 2008
Despite the hype, IP convergence does not happen overnight. Navigating the IP convergence market is not easy. Some network equipment makers are taking traditional voice over IP (VoIP) product lines and rebranding them as unified communications offerings. But beware: While closely related, VoIP and UC are not the same. Generally speaking, VoIP…
Descriptors: Computer Networks, Information Networks, Computer Mediated Communication, Free Enterprise System
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Panettieri, Joseph C. – T.H.E. Journal, 2006
The wireless bandwagon is rolling across Mississippi, picking up a fresh load of converts and turning calamity into opportunity. Traditional wired school networks, many of which unraveled during Hurricane Katrina, are giving way to advanced wireless mesh networks that frequently include voice-over-IP (VoIP) capabilities. Vendor funding is helping…
Descriptors: Computer Networks, Internet, Telecommunications, Computer Mediated Communication