Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 10 |
Computer System Design | 10 |
Program Implementation | 10 |
Higher Education | 4 |
Computer Security | 3 |
Information Systems | 3 |
Telecommunications | 3 |
Universities | 3 |
Computer Uses in Education | 2 |
Confidentiality | 2 |
Databases | 2 |
More ▼ |
Source
T.H.E. Journal | 2 |
Computers in Libraries | 1 |
EDUCAUSE Quarterly | 1 |
Educational Technology &… | 1 |
HyperNexus | 1 |
Information Processing and… | 1 |
Information Services and Use | 1 |
Author
Alberico, Ralph | 1 |
Coles, Elizabeth | 1 |
Glenn, Terrence J. | 1 |
Hazari, Sunil | 1 |
Littman, Marlyn K. | 1 |
Macleod, Ian A. | 1 |
Mechley, Victor P. | 1 |
Qayoumi, Mohammad H. | 1 |
Schaffhauser, Dian | 1 |
Suhonen, Jarkko | 1 |
Sutinen, Erkki | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 9 |
Journal Articles | 8 |
Speeches/Meeting Papers | 2 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Researchers | 1 |
Location
Arizona | 1 |
Finland | 1 |
Texas | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices

Macleod, Ian A.; And Others – Information Processing and Management, 1987
Discussion of the need for distributed information retrieval systems focuses on a model system, Fulcrum FUL/Text. Differences from distributed database management systems are described; system design is discussed; implementation requirements are explained including remote operation calls (ROC's); and a prototype simulation model based on FUL/Text…
Descriptors: Computer Networks, Computer Simulation, Computer System Design, Database Management Systems
Alberico, Ralph – Computers in Libraries, 1990
Discusses computer networks and online searching in libraries and describes plans for the development of the National Research and Education Network (NREN). Cooperation of government, academia, and industry is highlighted, digital video interactive (DVI) is described, implementation phases are explained, and current legislative developments are…
Descriptors: Computer Networks, Computer System Design, Databases, Federal Legislation
Suhonen, Jarkko; Sutinen, Erkki – Educational Technology & Society, 2006
FODEM (FOrmative DEvelopment Method) is a design method for developing digital learning environments for widely dispersed learning communities. These are communities in which the geographical distribution and density of learners is low when compared to the kind of learning communities in which there is a high distribution and density of learners…
Descriptors: Formative Evaluation, Foreign Countries, Educational Technology, Educational Environment
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design

Hazari, Sunil – T.H.E. Journal, 1995
Reports on the installation of a local area network (LAN) at East Carolina University. Topics include designing the network; computer labs and electronic mail; Internet connectivity; LAN expenses; and recommendations on planning, equipment, administration, and training. A glossary of networking terms is also provided. (AEF)
Descriptors: Administration, Computer Networks, Computer System Design, Costs
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
Glenn, Terrence J.; Mechley, Victor P. – 1993
With respect to the college's information systems, there were three major challenges facing Ohio's Cincinnati Technical College (CTC) in 1991. The expanding use of personal computers (PC's) and non-integrated systems often duplicated efforts and data on CTC's existing computer systems, users were demanding more access to data and more integration…
Descriptors: Administrative Organization, College Planning, Community Colleges, Computer Literacy

Coles, Elizabeth – Information Services and Use, 1991
Describes the implementation of BRS/Search in the Library and Information Services department of the Chem Systems Group, an international consulting organization in the United Kingdom. The use of integrated systems in special libraries is discussed, and requirements of the new system are explained, including full text capabilities and networking…
Descriptors: Chemical Industry, Computer Networks, Computer System Design, Databases
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy