NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Americans with Disabilities…1
Equal Access1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 132 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Sangpetch, Akkarit – ProQuest LLC, 2013
Large-scale enterprise applications are deployed as distributed applications. These applications consist of many inter-connected components with heterogeneous roles and complex dependencies. Each component typically consumes 5-15% of the server capacity. Deploying each component as a separate virtual machine (VM) allows us to consolidate the…
Descriptors: Computer Networks, Computer Oriented Programs, Reaction Time, Automation
Mitra, Pramita – ProQuest LLC, 2013
Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…
Descriptors: Handheld Devices, Shared Resources and Services, Computer Oriented Programs, Protocol Materials
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Kanellopoulos, Dimitris N. – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…
Descriptors: Multimedia Materials, Computer Oriented Programs, Computer Networks, Internet
Johnson, L.; Adams Becker, S.; Cummins, M.; Estrada, V.; Meira, A. – New Media Consortium, 2012
This report reflects a collaborative research effort to help inform Brazilian educational leaders about significant developments in technologies supporting teaching, learning, and creative inquiry in primary and secondary education. In an effort that ran from August through October 2012, a carefully selected group of 30 experts considered hundreds…
Descriptors: Foreign Countries, Elementary Secondary Education, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Azeta, A. A. – Turkish Online Journal of Distance Education, 2008
This paper describes an architectural framework and a prototype implementation of a web-based multi-channel e-Learning application that allows students, lecturers and the research communities to collaborate irrespective of the communication device a user is carrying. The application was developed based on the concept of "right once run on any…
Descriptors: Electronic Learning, Handheld Devices, Telecommunications, Laptop Computers
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Stout, Connie – 1992
The Texas Education Agency sought to create an enhanced electronic communications network (TENET) capable of transmitting information among and between the members of the public education system in Texas. They contracted with the Texas Higher Education Network (THEnet), an existing distributed network which is an NSF (National Science Foundation)…
Descriptors: Bibliographic Databases, Computer Networks, Computer Oriented Programs, Electronic Mail
Peer reviewed Peer reviewed
Lombroso, Paul; Eng, Lenny – Administration in Mental Health, 1987
Describes the process by which a department of psychiatry computerized its clinical services under a single communication network. Presents the program in detail, demonstrating the recording of various clinical, administrative and demographic data. Emphasizes the value of such information for returning patients, immediate updating of information,…
Descriptors: Computer Networks, Computer Oriented Programs, Computer System Design, Computers
Beckham, Bonnie – Technological Horizons in Education, 1989
Assesses BRUNET, a campuswide network that links more than 100 academic and administrative buildings and 40 dormitories. Notes a key element is hierarchical network management and support. Discusses the deployment, security, and use of four networking spheres in the system. (MVL)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Nelson, Arvid – Technological Horizons in Education, 1989
Investigates Project CANS (Computer-Assisted Network Systems), a program to develop computer-assisted instruction, computer-managed instruction and computer-managed classroom activities in Cook County, Illinois. Discusses the operation of the program since 1984. Provides a description of the equipment available to each classroom and building. (MVL)
Descriptors: Classroom Techniques, Computer Networks, Computer Oriented Programs, Computer Peripherals
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9