NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Behrend, Tara S.; Wiebe, Eric N.; London, Jennifer E.; Johnson, Emily C. – Behaviour & Information Technology, 2011
Cloud computing is gaining popularity in higher education settings, but the costs and benefits of this tool have gone largely unexplored. The purpose of this study was to examine the factors that lead to technology adoption in a higher education setting. Specifically, we examined a range of predictors and outcomes relating to the acceptance of a…
Descriptors: Community Colleges, Usability, Rural Areas, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2010
Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…
Descriptors: Computer Software, Internet, Computer Software Evaluation, Computer Networks
Raths, David – Campus Technology, 2011
Many university officials recognize the need to upgrade their older analog video surveillance systems. In a 2010 survey by "Campus Safety" magazine, half of university respondents expressed dissatisfaction with the quality and coverage of their current video surveillance systems. Among the limitations of analog closed-circuit television…
Descriptors: Video Technology, Internet, Computer Uses in Education, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Aaron, Lynn S.; Roche, Catherine M. – Journal of Educational Technology Systems, 2011
"Cloud computing" refers to the use of computing resources on the Internet instead of on individual personal computers. The field is expanding and has significant potential value for educators. This is discussed with a focus on four main functions: file storage, file synchronization, document creation, and collaboration--each of which…
Descriptors: Internet, Cooperation, College Faculty, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Stevenson, Michael; Hedberg, John G. – Educational Media International, 2011
This paper reviews the research on the disruptive and transformative potential of newly-emerging cloud-based pedagogies. It takes into consideration the extent to which Cloud Computing can be leveraged to disseminate and scale web-based applications within and across learning contexts. It examines ideas from current literature in Web 2.0- and…
Descriptors: Constructivism (Learning), Collaborative Writing, Internet, Citizenship
Peer reviewed Peer reviewed
Direct linkDirect link
Zelkowski, Jeremy – TechTrends: Linking Research and Practice to Improve Learning, 2011
This article justifies classifying the TI-Nspire CAS Touchpad as a mobile device for grades 8-16 mathematics classrooms equipped with a Navigator system. The 2010 Horizon Report: K-12 indicates virtually every secondary school aged child has some sort of mobile device. Yet, many school policies ban the use of mobile devices, preventing students…
Descriptors: Mathematics Instruction, Teaching Methods, Time on Task, Classroom Techniques
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Kirkwood, Keith – Campus-Wide Information Systems, 2010
Purpose: This paper aims to introduce an enterprise-wide Web 2.0 learning support platform--SNAP, developed at Victoria University in Melbourne, Australia. Design/methodology/approach: Pointing to the evolution of the social web, the paper discusses the potential for the development of e-learning platforms that employ constructivist, connectivist,…
Descriptors: Foreign Countries, Electronic Learning, Communities of Practice, Knowledge Management
Goldsborough, Reid – Black Issues in Higher Education, 2004
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Descriptors: Computer Security, Computer Storage Devices, Computers, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
St. George, Art – EDUCAUSE Review, 2007
Today, at the end of 2007, there are evident consolidations in wireless, storage, and virtualization and the path forward seems clearer now than previously. Trends from last year continue strongly, particularly Web 2.0 and the shift to user-driven environments and Internet sites where significant data and video processing is available to those…
Descriptors: Internet, Educational Trends, Information Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models