NotesFAQContact Us
Collection
Advanced
Search Tips
Education Level
Laws, Policies, & Programs
Americans with Disabilities…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Bordewieck, Martin; Elson, Malte – Applied Cognitive Psychology, 2021
Troubleshooting is a particular problem-solving process comprising error detection, fault diagnosis, and system restoration. Since automation of systems has become increasingly complex and ubiquitous, troubleshooting skills are crucial to maintain safety and security in a variety of contexts. The planned study aims at examining troubleshooting…
Descriptors: Problem Solving, Error Patterns, Visual Aids, Cognitive Style
Peer reviewed Peer reviewed
Direct linkDirect link
Matoria, Ram Kumar; Upadhyay, P. K.; Moni, Madaswamy – Program: Electronic Library and Information Systems, 2007
Purpose: To describe the development of the library management system, e-Granthalaya, for public libraries in India. This is an initiative of the Indian government's National Informatics Centre (NIC). The paper outlines the challenges and the potential of a full-scale deployment of this software at a national level. Design/methodology/approach:…
Descriptors: Public Libraries, Library Automation, Foreign Countries, Computer Networks
Borgman, Christine L. – Proceedings of the ASIS Annual Meeting, 1995
Discussion of the Global Information Infrastructure (GII) focuses on a longitudinal study conducted in Central and Eastern Europe that investigated two issues: (1) the relationship between computing networks and library automation in establishing a national information infrastructure, and (2) requirements for library automation for exchanging…
Descriptors: Computer Networks, Foreign Countries, Global Approach, Information Retrieval
Barkley, John – 1986
This report develops a model of a personal computer network for office use from the standpoint of the end user. A network designed for personal computers is differentiated from personal computers which must be attached to an existing communications system. Three types of the latter networks are discussed: (1) networks which connect personal…
Descriptors: Computer Networks, Information Networks, Microcomputers, Network Analysis
Peer reviewed Peer reviewed
Rubinyi, Robert M. – Journal of Communication, 1989
Studies 72 small nonprofit organizations over a 2-year period that began with their initial adoption of computer technology. Finds that, even among these relatively resource-poor groups, those who were better off were better able to take advantage of the computer for internal office tasks and group networking. (SR)
Descriptors: Adoption (Ideas), Communication Research, Community Organizations, Computer Networks
Peer reviewed Peer reviewed
Lucas, Thomas A. – College and Research Libraries, 1993
Describes a transaction log analysis of the New York Public Library research libraries' OPAC (online public access catalog). Much of the remote searching occurred when the libraries were closed and was more evenly distributed than internal searching, demonstrating that remote searching could expand access and reduce peak system loads. (Contains…
Descriptors: Computer Networks, Information Management, Library Automation, Library Catalogs
Morell, Jonathan A.; And Others – 1987
A framework for assessing the implementation and impact of office automation (OA) technology within shore-based facilities of the U.S. Navy is provided. Following a list of the assumptions guiding the evaluation plan, a model for data collection is presented which is based on the perspective of a work group, i.e., a small number of individuals who…
Descriptors: Change Strategies, Computer Networks, Data Collection, Evaluation Methods
Peer reviewed Peer reviewed
Denenberg, Ray – Library Hi Tech, 1990
Describes the layered model of Open Systems Interconnection (OSI); summarizes the three upper and lower layers; and discusses data communications standards associated with specific layers. Architectural concepts are explored, including hierarchy and abstraction, levels of dialogue, internetworking, and end-to-end communication. OSI is compared…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Systems
Bridge, Frank R. – Library Journal, 1993
The first part of the annual automation marketplace survey examines minicomputer systems in libraries. Highlights include vendor consolidation and acquisitions; system interconnection; networked databases; products related to the Americans with Disabilities Act; multimedia; vendor installations worldwide; academic versus public library…
Descriptors: Computer Networks, Computer Software, Databases, Integrated Library Systems
Pepin, Theresa; And Others – Library Journal, 1997
This report analyzes data gathered from 29 automated library system vendors who responded to a 1996 survey. The survey also requested their perceptions of Java (an object-oriented programming language) and network computers, and issues and trends to be considered by library administrators. Contact information about the vendors is provided. (Four…
Descriptors: Computer Networks, Electronic Libraries, Library Administration, Library Automation
Kitching, Christopher – 1991
This report is based on a questionnaire sent to 32 selected National Archives and on interviews with archivists from eight countries. Geared to the needs of developing countries, the report covers: (1) the impact of computerization on finding aids; (2) advantages and problems of computerization, including enhanced archival control, integration of…
Descriptors: Archives, Automation, Computer Networks, Computer Oriented Programs
Peer reviewed Peer reviewed
Lehmann, Stephen; Renfro, Patricia – College and Research Libraries, 1991
Discussion of how scholars work and how they use information focuses on a case study of the use of new electronic resources by humanist scholars. Interviews with humanists at the University of Pennsylvania about their experiences with the RLIN (Research Libraries Information Network) database are discussed, including content, connectivity, user…
Descriptors: Academic Libraries, Case Studies, Computer Networks, Costs
Charny, Wendy – 1997
This paper reports on a study conducted to collect the data pertaining to corporate libraries in the United States in order to provide a statistical profile of these special libraries. A review of the literature was performed. The researcher used the online "1996 Directory of Special Libraries and Information Centers," which lists 21,380…
Descriptors: Background, Computer Networks, Corporate Libraries, Corporations
Peer reviewed Peer reviewed
Borgman, Christine L. – Journal of Documentation, 1996
Reports on a survey of 70 research libraries in Croatia, Czech Republic, Hungary, Poland, Slovakia, and Slovenia. Results show that libraries are rapidly acquiring automated processing systems, CD-ROM databases, and connections to computer networks. Discusses specific data on system implementation and network services by country and by type of…
Descriptors: Computer Networks, Databases, Foreign Countries, Information Services
Previous Page | Next Page ยป
Pages: 1  |  2  |  3