NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 466 to 480 of 2,323 results Save | Export
Cain, Mark – 2000
There is a whole infrastructure that must support a successful universal student computing requirement. Conventional approaches would have the students plugging into a wired network. That would necessitate network wires and hubs or many ports in each classroom. Students would need access to course-related software. Because the needs would change…
Descriptors: College Curriculum, Computer Assisted Instruction, Computer Networks, Computer Uses in Education
AEL, 2004
Grid computing allows large groups of computers (either in a lab, or remote and connected only by the Internet) to extend extra processing power to each individual computer to work on components of a complex request. Grid middleware, recognizing priorities set by systems administrators, allows the grid to identify and use this power without…
Descriptors: Computer Uses in Education, Computers, Computer System Design, Computer Networks
Martin, Andrea; Dean, Vicky – CAUSE/EFFECT, 1996
Discusses the management perspectives of the transition to distributed support services for information technology at Rice University (Texas), focusing on the implementation process, changes that were required in migrating from a strong centralized organization to a distributed model, and the challenges encountered in the implementation. (MDM)
Descriptors: Computer Networks, Computers, Decentralization, Higher Education
Peer reviewed Peer reviewed
Fietzer, William – Against the Grain, 1996
Community networks are electronic information services that enable members of communities to inform one another about current issues. Discusses how community networks operate, what they do, budget constraints and innovation, problems and shortcomings, causes and solutions, and where libraries fit in. Highlights Charlotte's Web, a community network…
Descriptors: Budgets, Case Studies, Community Services, Computer Networks
Machovec, George S. – Online Libraries and Microcomputers, 1997
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Databases
DeLoughry, Thomas J. – Chronicle of Higher Education, 1996
Computing authorities at 34 research universities have launched an effort to create a national computer network for higher education several times as fast as the Internet. The network would be supported by several corporate partners in computer and telecommunications industries and by the federal government, would not replace Internet connections,…
Descriptors: Administrator Attitudes, Computer Networks, Efficiency, Higher Education
Peer reviewed Peer reviewed
Fahmi, Ismail – International Information & Library Review, 2002
Describes the Indonesian Digital Library Network that is designed to develop Indonesia as a knowledge-based society. Highlights include the digital divide; problems in a developing country, including Internet accessibility, bandwidth capacity, and network delays; gathering information about national assets; information infrastructure; data…
Descriptors: Computer Networks, Data Collection, Developing Nations, Electronic Libraries
Peer reviewed Peer reviewed
Lightfoot, Ed; Ihrig, Weldon – EDUCAUSE Review, 2002
Describes a planning framework that provides the technical foundation necessary to support Web-based relationships and applications in higher education. The framework enables delivery of information, tools, and services to all of a university's constituents. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Higher Education, Models
Dern, Daniel P. – Online, 1997
Online users leave traces that others can find and use. Provides an overview of where and how users leave traces and what users can do to protect their privacy. Discusses Internet accounts; special files ("signature,""plan,""project,""file,""finger,""whois," and "vacation");…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Privacy
Lasek, Alicia – School Planning and Management, 1997
Steady technology growth has allowed a Massachusetts school district to build a large, centralized database; improve a vast array of standard administrative operations; and design software applications tailored to many special needs. (MLF)
Descriptors: Computer Networks, Computer Uses in Education, Databases, Elementary Secondary Education
Peer reviewed Peer reviewed
Burke, Lauren – Journal of the American Society for Information Science and Technology, 2002
Discusses Web site design and information architecture in light of principles of New Urbanism that are being applied in urban planning situations. Topics include networked electronic environment design; user-centered network design; multidisciplinary approaches; knowledge access and collaboration; and the Global Information Infrastructure…
Descriptors: Access to Information, Computer Networks, Global Approach, Information Science
Peer reviewed Peer reviewed
Jacobs, Jim – Government Publications Review, 1990
Discusses electronic bulletin boards that have been created by U.S. government agencies and suggests a method to make the information they contain more accessible to libraries and the public. Costs and technological issues are considered, and an appendix describes networks and computer programs that would facilitate access to government…
Descriptors: Access to Information, Computer Networks, Computer Software, Costs
Persano, Peter A. – American School Board Journal, 1990
Describes New Haven (Connecticut) Public Schools' decentralized computer network system, which links its 42 schools electronically, keeps better track of students, and has allowed the district to centralize its school registration. A sidebar describes New Haven's computerized curriculum network designed to help teachers track students' daily…
Descriptors: Computer Networks, Computer Uses in Education, Confidentiality, Databases
Peer reviewed Peer reviewed
Zuccaro, Bruno – Online Review, 1990
Describes the information systems strategy and network development of the Benetton clothing business. Applications in the areas of manufacturing, scheduling, centralized distribution, and centralized cash flow are discussed; the GEIS managed network service is described; and internal and external electronic data interchange (EDI) is explained.…
Descriptors: Centralization, Computer Networks, Corporations, Foreign Countries
Peer reviewed Peer reviewed
Robin, Richard M.; Leaver, Betty Lou – Foreign Language Annals, 1989
Describes the Listening Comprehension Exercise Network, a system that allows for the sharing of listening exercises in Russian via computer networks. The network, which could be emulated in other languages, alleviates the problem of time spent on developing essentially "throw-away" exercises. (21 references) (Author/CB)
Descriptors: Computer Networks, Language Proficiency, Learning Activities, Listening Comprehension
Pages: 1  |  ...  |  28  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  ...  |  155