Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
CD-ROM Professional | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
Educational Technology | 1 |
Journal of Educational… | 1 |
Author
Chretien, Wendy | 1 |
Jaffe, Lee David | 1 |
Johnson, D. LaMont | 1 |
Maddux, Cleborne D. | 1 |
Qayoumi, Mohammad H. | 1 |
Switzer, Jamie S. | 1 |
Switzer, Ralph V., Jr. | 1 |
Voloudakis, John | 1 |
Watkins, Steven G. | 1 |
Woody, Carol | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Guides - Non-Classroom | 2 |
Information Analyses | 2 |
Guides - General | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Practitioners | 2 |
Media Staff | 1 |
Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security

Jaffe, Lee David; Watkins, Steven G. – CD-ROM Professional, 1992
Presents selection and design considerations to help libraries make informed decisions about hardware configurations of CD-ROM systems. Highlights include CD-ROM configurations, including single drive workstations, daisychains, and jukeboxes; network configurations, including remote access; microcomputer features; CD-ROM drive selection; and…
Descriptors: Access to Information, Computer Networks, Computer System Design, Cost Effectiveness
Maddux, Cleborne D.; Johnson, D. LaMont – Educational Technology, 1997
Guidelines for educational Web sites are discussed: determining the purpose; providing essential identifiers; determining page length; revising; establishing Internet Child Safety rules; providing a model for observing copyright law; providing links to home pages; using professional language; using images judiciously; assuring the page looks good…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer System Design, Computer Uses in Education

Switzer, Ralph V., Jr.; Switzer, Jamie S. – Journal of Educational Technology Systems, 1993
Describes a study that researched elements necessary for the design of an interactive video learning (IVL) lab for business courses. Highlights include a review of pertinent literature; guidelines for the use of an IVL lab; IVL systems integration; system specifications; hardware costs; and system software. (five references) (LRW)
Descriptors: Business Administration Education, Computer Assisted Instruction, Computer Centers, Computer Networks
1996
Two papers addressing the practicalities of developing and managing a Web page include: "Managing a Web Node" (John Messing); and "Creating and Managing a School Library Web Page" (John Carr). The first paper discusses five areas in planning/managing a Web page: skills required; hardware and software requirements; planning…
Descriptors: Computer Networks, Computer System Design, Computer Uses in Education, Educational Equipment
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy