NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Odigie, Imoisili Ojeime; Gbaje, Ezra Shiloba – E-Learning and Digital Media, 2017
Online video streaming is a learning technology used in today's world and reliant on the availability of bandwidth. This research study sought to understand the perceptions of network gatekeepers about bandwidth and online video streams in Ahmadu Bello University, Nigeria. To achieve this, the interpretive paradigm and the Network Gatekeeping…
Descriptors: Foreign Countries, Video Technology, Qualitative Research, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Havelka, Douglas – Journal of Information Systems Education, 2016
A study was performed to test the impact of factors suggested by social capital and social cognitive theories as important antecedents to team performance on information technology (IT) course projects. Specifically, the impact of personal outcome expectations and social interaction ties on the quality and quantity of knowledge sharing is…
Descriptors: Student Projects, Social Capital, Social Theories, Social Cognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Singh, Lenandlar – Turkish Online Journal of Distance Education, 2013
Web 2.0 and specifically Social Networking Software have become ubiquitous tools for communication over the last five years. Across many disciplines, practitioners and researchers have been exploring these technologies with the hope of tapping into their perceived potential. Not least in this endeavor is the field of Education. Educators and…
Descriptors: Instructional Effectiveness, Foreign Countries, Computer Science, Video Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Dula, Michael W.; Ye, Gan – Journal of Web Librarianship, 2012
In this case study the authors describe Pepperdine University Libraries' migration to OCLC's WorldShare Management Services. They elaborate on the rationale for the decision, review some of the challenges and lessons encountered along the way, and briefly discuss some effects of the new system on our libraries. The focus is on technical services…
Descriptors: Library Materials, Information Transfer, Internet, Computer Software
Peer reviewed Peer reviewed
Courtright, John A. – Western Journal of Speech Communication, 1987
Discusses how PRINT, a Turbo Pascal computer program, can assist communication researchers who spend the majority of their time dealing with textual material. Provides an overview of the program's ability to display files in a single or double format, convert files from WordStar file to normal ASCII, and provide information when prompted or at the…
Descriptors: Communication Research, Computer Software, Computer Software Reviews, Evaluation Methods
Tsai, Bor-sheng – Proceedings of the ASIS Annual Meeting, 1991
Examines the information communication process and proposes a fuzzy commonality model for improving communication systems. Topics discussed include components of an electronic information programing and processing system and the flow of the formation and transfer of information, including DOS (disk operating system) commands, computer programing…
Descriptors: Communication (Thought Transfer), Computer Software, Information Systems, Information Transfer
Peer reviewed Peer reviewed
Direct linkDirect link
Matoria, Ram Kumar; Upadhyay, P. K. – Program: Electronic Library and Information Systems, 2005
Purpose: To share the experiences gained during the migration of library data from one library management system (LibSys[TM]) to another (e-Granthalaya[TM]). Design/methodology/approach: The paper describes the step-by-step approach taken to migrate the existing library data to the new software. The paper also discusses the peculiarities of the…
Descriptors: Library Administration, Computer Software, Foreign Countries, Case Studies