NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 1 to 15 of 180 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Katharina C. Cramer; Nicolas V. Rüffin – Minerva: A Review of Science, Learning and Policy, 2025
Political interest in Research Infrastructures on a European scale has been a new phenomenon, marked in the early 2000s with the launch of the Lisbon Strategy and the European Research Area. European Research Infrastructure policy then developed through, first, the strategic incorporation of incumbents through new modes of coordination; second,…
Descriptors: Research, Foreign Countries, Computer Networks, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Barbosa, Jorge Luis Victória; Barbosa, Débora Nice Ferrari; Rigo, Sandro José; de Oliveira, Jezer Machado; Rabello, Solon Andrade, Jr. – International Journal of Information and Communication Technology Education, 2014
The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. This article proposes the integration between two models dedicated to support ubiquitous learning environments, called Global and CoolEdu. CoolEdu is a generic collaboration model for decentralized environments. Global is an…
Descriptors: Educational Strategies, Educational Technology, Models, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Nathan R. – Journal of Technical Writing and Communication, 2014
This article describes protocological rhetoric as a conceptual tool for exploring and changing institutions. Protocological rhetoric is an extension of two lines of thought: Porter, Sullivan, Blythe, Grabill, and Miles's institutional critique and Science & Technology Studies's (STS) concept of information infrastructure. As a result,…
Descriptors: Rhetoric, Case Studies, Educational Change, Change Strategies
Office of Educational Technology, US Department of Education, 2017
Seminole County School District is the 12th largest district in Florida and is located northeast of Orlando. The district serves students in grades Prekindergarten through 12. As of 2015-16, the student population was 53% White, 24% Hispanic, and 15% Black. Approximately 47% of students qualify for free or reduced-price lunch, and 4% are…
Descriptors: County School Districts, Preschool Education, Elementary Secondary Education, Superintendents
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
He, Aiguo – International Journal of Distance Education Technologies, 2011
Computer system is useful for improving real time and interactive distance education activities. Especially in the case that a large number of students participate in one distance lecture together and every student uses their own computer to share teaching materials or control discussions over the virtual classrooms. The problem is that within…
Descriptors: Distance Education, Educational Technology, Guidance, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Ttofis, C.; Theocharides, T.; Michael, M. K. – IEEE Transactions on Education, 2012
Manycore systems have emerged as being one of the dominant architectural trends in next-generation computer systems. These highly parallel systems are expected to be interconnected via packet-based networks-on-chip (NoC). The complexity of such systems poses novel and exciting challenges in academia, as teaching their design requires the students…
Descriptors: Computer System Design, Computer Networks, Computer Science Education, Teaching Methods
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Fang; Brabston, Mary – Journal of Information Systems Education, 2011
We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…
Descriptors: Computer Networks, Information Science Education, Information Networks, Theory Practice Relationship
Chudnov, Daniel – Computers in Libraries, 2010
Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…
Descriptors: Internet, Computer System Design, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Marissa L.; Cline, Mark A. – Journal of Science Education and Technology, 2011
Radford University was recently configured with a campus-wide wireless local area network. Using these new capabilities, a classroom-based Honors section of Concepts of Biology was conducted solely using electronic technologies (paper was never transferred from professor to student). To accomplish this, students used common software and freeware.…
Descriptors: Biology, Instructional Effectiveness, Computer Software, Educational Technology
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12