NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
General Accounting Office, Washington, DC. Information Management and Technology Div. – 1991
This report was prepared in response to a request for information on supercomputers and high-speed networks from the Senate Committee on Commerce, Science, and Transportation, and the House Committee on Science, Space, and Technology. The following information was requested: (1) examples of how various industries are using supercomputers to…
Descriptors: Aerospace Industry, Business Communication, Computer Networks, Computer Simulation
Maddux, Cleborne D. – Educational Technology, 1989
Identifies and discusses 10 overly optimistic claims for the use of computers in the classroom, and makes recommendations concerning each claim. Highlights include computer labs versus curriculum integration; the development of hardware versus software; the values of computer literacy; computer networking; computer education training; the use of…
Descriptors: Artificial Intelligence, Computer Assisted Instruction, Computer Literacy, Computer Networks