NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Fair Labor Standards Act1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 36 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Chander Diwaker; Neha Miglani – Journal of Computer Assisted Learning, 2025
Background: The ever-increasing computational demands call for optimal resource utilisation and system performance in the cloud environment. Organisations are increasingly migrating workloads to cloud platforms, mandating the need for efficient resource distribution. Load balancing, a critical cloud component, ensures equitable distribution of…
Descriptors: Internet, Information Storage, Educational Practices, Computation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark – Journal of Web Librarianship, 2010
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
Descriptors: Distance Education, Cooperation, Educational Technology, Library Services
Peer reviewed Peer reviewed
Direct linkDirect link
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Qing; Zhao, Jianmin; Zhu, Xinzhong – International Journal of Distance Education Technologies, 2009
Supporting efficient data access in the mobile learning environment is becoming a hot research problem in recent years, and the problem becomes tougher when the clients are using light-weight mobile devices such as cell phones whose limited storage space prevents the clients from holding a large cache. A practical solution is to store the cache…
Descriptors: Electronic Learning, Research Problems, Statistical Data, Statistical Inference
Peer reviewed Peer reviewed
Mostafa, Javed – Annual Review of Information Science and Technology (ARIST), 1994
Reviews the literature relating to the development and application of modern imaging technology between 1987 and 1993. Highlights include image representation, including image data, compression, and image formats; and image access, including indexing and modeling, user interface design, and distributed access. (143 references) (LRW)
Descriptors: Access to Information, Computer Networks, Indexing, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, Fredrick – EDUCAUSE Quarterly, 2004
The digital materials that faculty produce for their classrooms often are saved only to storage devices that might become obsolete in a few years. Without an institutional effort to provide access systems, storage, and services for their digital media, are campuses in danger of creating "Disposable Scholarship"? In this article, the author…
Descriptors: Preservation, Higher Education, Information Storage, Information Needs
Sauer, Jeff – NewMedia, 1997
Removable hard drives and Ethernet are common ways to move data around the media studio, but new protocols allow multiple computers to share an array on one bus. Examines shared storage configurations using fibre channel arbitrated loop (FC-AL) and serial storage architecture (SSA), both serial storage solutions, as well as on small computer…
Descriptors: Computer Networks, Database Management Systems, Information Needs, Information Networks
Previous Page | Next Page ยป
Pages: 1  |  2  |  3