Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Black Issues in Higher… | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Applied… | 1 |
Journal of Information… | 1 |
Primary Science Review | 1 |
School Business Affairs | 1 |
Author
Bennett, Cedric | 1 |
Boja, Catalin | 1 |
Day, David J. | 1 |
Goldsborough, Reid | 1 |
Higginbotham, Barbara | 1 |
Lallie, Harjinder Singh | 1 |
Lawson, Phillip | 1 |
Ravage, Barbara | 1 |
Smith, Gary | 1 |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
New Mexico | 1 |
Romania | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Boja, Catalin – Journal of Applied Quantitative Methods, 2006
There are described methods used to minimize data files dimension. There are defined indicators for measuring size of files and databases. The storage optimization process is based on selecting from a multitude of data storage models the one that satisfies the propose problem objective, maximization or minimization of the optimum criterion that is…
Descriptors: Databases, Data, Information Science, Information Storage
Goldsborough, Reid – Black Issues in Higher Education, 2004
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Descriptors: Computer Security, Computer Storage Devices, Computers, Internet
Higginbotham, Barbara – Primary Science Review, 2003
In this article, the author shares some notes from her own experience of supporting and delivering many hands-on datalogging workshops and using a variety of datalogging systems. She hopes they will be useful to those with less experience. She has broken down the notes into two main areas: the practicalities and learning about datalogging.…
Descriptors: Workshops, Information Technology, Science Instruction, Science Education
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration