NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Fair Labor Standards Act1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Vaughn, Sandy – Learning & Leading with Technology, 2010
Total technology immersion doesn't happen overnight, but with vision and determination, transformation can take hold and start to grow. Floydada Independent School District (FISD), winner of the 2010 Sylvia Charp Award for District Innovation in Technology, is a great example of what a district can achieve when starting with a modest tech…
Descriptors: Socioeconomic Status, Minority Groups, Technology Integration, Computer Uses in Education
Villano, Matt – Campus Technology, 2010
If a school is seeking to incorporate more collaborative approaches to teaching and learning, the design of the learning environment--whether it's a classroom or a more informal space--can be a critical factor in making this transformative move. Technology, in particular, can play a pivotal role in enabling students to work effectively in teams…
Descriptors: Cooperative Learning, Teacher Collaboration, Educational Facilities Improvement, Educational Facilities Planning
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Watson, Linda – Vocational Education Journal, 1994
Looks at the Texas Education Network (TENET), a computer network that allows students to communicate with students all over the country. Describes projects used in a business education classroom. (JOW)
Descriptors: Business Education, Computer Networks, Secondary Education
O'Hanlon, Charlene – Campus Technology, 2007
Traditionally, the high-performance computing (HPC) systems used to conduct research at universities have amounted to silos of technology scattered across the campus and falling under the purview of the researchers themselves. This article reports that a growing number of universities are now taking over the management of those systems and…
Descriptors: Computers, Researchers, Information Management, Research Universities
Peer reviewed Peer reviewed
Hiel, Edwin R.; Herrington, David – Journal of Extension, 1997
Interviews with end users identified uses of the Trans Texas Videoconferencing Network: college courses (60%), continuing education, administration, outreach, scientific collaboration, and public special interest groups. Problems were also identified: scheduling difficulties, inconvenient remote facilities, teacher training, and technical support.…
Descriptors: Computer Networks, Distance Education, Extension Education, Higher Education
Peer reviewed Peer reviewed
T.H.E. Journal, 2004
Bringing the Dallas Independent School District (Dallas ISD) up to speed (as well as to a computer-to-student ratio of 3:1, up from its current respectable 4:1) requires, before additional desktops can be contemplated, a massive commitment to upgrading the network. Though HP has been a long-time partner with the Dallas ISD, the bidding for the…
Descriptors: Internet, Elementary Secondary Education, School Districts, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Previous Page | Next Page ยป
Pages: 1  |  2  |  3