NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 196 to 210 of 2,323 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Berman, Francine – EDUCAUSE Review, 2008
Providing an evolving foundation for 21st-century research and education, cyberinfrastructure is both a focus for invention and an accelerator of innovation, linked through a trajectory that begins with design and evolves to broad-based use. (Contains 1 figure, 1 table and 11 notes.)
Descriptors: Computer Networks, Internet, Technological Advancement, Computer Mediated Communication
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Hoffman, Richard – Technology & Learning, 2007
Wireless connectivity in schools is all the rage, and many school systems have at least gotten their feet wet with a wireless lab or a few portable laptop carts. But Bijaya Devkota, the chief information officer of Charles County Public Schools, has done what many school systems only dream of--implemented universal wireless access throughout his…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Public Schools
Liss, Alan – Telecommunications, 1996
Discusses bandwidth on demand technologies, including frame relay and ISDNs (integrated services digital networks). Topics include tariff policies; lack of standards; market conditions; growth in the Internet market and the World Wide Web; and the growing need for remote access. (LRW)
Descriptors: Computer Networks, Standards, World Wide Web
Galbreath, Jeremy – Educational Technology, 1997
Provides an update on the standards that are governing digital multimedia technology. Highlights include symmetrical multimedia standards that include a variety of compression and transmission schemes; asymmetrical multimedia standards that includes compressed digital motion video and still images; applications sharing; networks; and the Internet.…
Descriptors: Computer Networks, Internet, Photographs, Standards
Enderle, Jerry – School Planning & Management, 2003
Discusses issues of security for school computer networks, including protection against viruses and hackers. (EV)
Descriptors: Computer Networks, Computer Security, School Security
Berry, John; Quinn, Judy – Library Journal, 1991
Discusses the 1991 White House Conference on Library and Information Services (WHCLIS). Topics discussed include conference issues, including keynote speakers, procedural difficulties, and the failure to attract media attention; and substantive issues, including a recommendation to establish an office to focus on children and youth literacy, and…
Descriptors: Computer Networks, Conferences, Literacy, Problems
Bloomquist, Jane; Musa, Atif – Technology & Learning, 2004
Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…
Descriptors: Educational Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Lozano-Hemmer, Rafael; Gomez-Pena, Guillermo – Aztlan: A Journal of Chicano Studies, 2004
The leaked documents of the tech-illa network are investigated. It was unclear that if the information was left in the cracked server on purpose, to be distributed by the hackers as a decoy.
Descriptors: Internet, Computer Networks, Computer Security, Crime
Villano, Matt – Technology & Learning, 2005
In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…
Descriptors: Telecommunications, Computer Networks, Internet, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Eisenberg, Mike – Library Journal, 2008
The Web 2.0 "buzz" starts with new technologies such as virtual worlds, cell phones and handheld devices that offer 24/7 web access, tagging, social networks, and blogs and brings together various web capabilities in unique combinations. Web 2.0, however, is about much more than the technology--it is about a change in focus to participation, user…
Descriptors: Information Science Education, Information Needs, Libraries, Information Science
Johnson, L.; Levine, A.; Smith, R.; Smythe, T.; Stone, S. – New Media Consortium, 2009
The New Media Consortium's Horizon Project is an ongoing research project that aims to identify and describe emerging technologies likely to have a large impact on teaching, learning, or creative inquiry within education around the globe over a five-year time period. The project's central products are the "Horizon Reports", an annual…
Descriptors: Educational Change, Foreign Countries, Technological Advancement, Influence of Technology
Pages: 1  |  ...  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  ...  |  155