NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Wynn, Martin; Turner, Phillip; Abas, Hanida; Shen, Rui – Industry and Higher Education, 2009
Information systems strategy is an increasingly important component of overall business strategy in small and medium-sized enterprises (SMEs). The need for readily available and consistent management information, drawn from integrated systems based on sound and upgradeable technologies, has led many senior company managers to review the business…
Descriptors: Information Systems, Management Information Systems, Information Technology, Computer Software Evaluation
Marcin, Susan; Morris, Peter – Computers in Libraries, 2008
Over the last few years, there has been a wealth of materials written and presented on next-generation library catalogs. These next-generation interfaces strive to turn "standard" integrated library systems (ILSs) into more nimble and robust search platforms that offer more user-friendly 2.0 enhancements for users. Rather than abandoning…
Descriptors: Academic Libraries, Library Services, Vendors, Online Catalogs
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Jukic, Nenad; Gray, Paul – Journal of Information Systems Education, 2008
This paper describes the value that information systems faculty and students in classes dealing with database management, data warehousing, decision support systems, and related topics, could derive from the use of the Teradata University Network (TUN), a free comprehensive web-portal. A detailed overview of TUN functionalities and content is…
Descriptors: Decision Support Systems, Information Systems, Learning Processes, Computer Software Evaluation
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management
Peer reviewed Peer reviewed
Direct linkDirect link
Robbins, Russell W.; Butler, Brian S. – Journal of Information Systems Education, 2009
Like any infrastructure technology, Virtual World (VW) platforms provide affordances that facilitate some activities and hinder others. Although it is theoretically possible for a VW platform to support all types of activities, designers make choices that lead technologies to be more or less suited for different learning objectives. Virtual World…
Descriptors: Computer Assisted Instruction, Barriers, Educational Objectives, Teaching Methods
Khan, Kamran – Information Management & Technology, 1998
Excalibur RetrievalWare offers true knowledge retrieval solutions. Its fundamental technologies, Adaptive Pattern Recognition Processing and Semantic Networks, have capabilities for knowledge discovery and knowledge management of full-text, structured and visual information. The software delivers a combination of accuracy, extensibility,…
Descriptors: Computer Software Evaluation, Expert Systems, Information Management, Information Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Pendergast, Mark O. – Journal of Information Technology Education, 2006
This paper examines the impact the use of the Java programming language has had on the way our students learn to program and the success they achieve. The importance of a properly constructed first course in programming cannot be overstated. A course well experienced will leave students with good programming habits, the ability to learn on their…
Descriptors: Programming Languages, Active Learning, Programming, Introductory Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gupta, Amardeep – Journal of Educational Technology, 2005
Current search engines--even the constantly surprising Google--seem unable to leap the next big barrier in search: the trillions of bytes of dynamically generated data created by individual web sites around the world, or what some researchers call the "deep web." The challenge now is not information overload, but information overlook.…
Descriptors: Search Engines, Computer System Design, Computer Software Evaluation, Information Retrieval
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Peer reviewed Peer reviewed
Stanton, Deidre E.; Hooper, Todd – Public-Access Computer Systems Review, 1992
Describes and evaluates LIBS Internet Access Software (also called Sonoma Software), which offers automatic Telnet connection to remote library catalogs, databases, information services, campuswide information services, and other wide-area information access tools. Instructions for obtaining and installing the software are given, and a comparison…
Descriptors: Access to Information, Computer Software Evaluation, Computer System Design, Gateway Systems