NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Macleod, Ian A.; And Others – Information Processing and Management, 1987
Discussion of the need for distributed information retrieval systems focuses on a model system, Fulcrum FUL/Text. Differences from distributed database management systems are described; system design is discussed; implementation requirements are explained including remote operation calls (ROC's); and a prototype simulation model based on FUL/Text…
Descriptors: Computer Networks, Computer Simulation, Computer System Design, Database Management Systems
Alberico, Ralph – Computers in Libraries, 1990
Discusses computer networks and online searching in libraries and describes plans for the development of the National Research and Education Network (NREN). Cooperation of government, academia, and industry is highlighted, digital video interactive (DVI) is described, implementation phases are explained, and current legislative developments are…
Descriptors: Computer Networks, Computer System Design, Databases, Federal Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Suhonen, Jarkko; Sutinen, Erkki – Educational Technology & Society, 2006
FODEM (FOrmative DEvelopment Method) is a design method for developing digital learning environments for widely dispersed learning communities. These are communities in which the geographical distribution and density of learners is low when compared to the kind of learning communities in which there is a high distribution and density of learners…
Descriptors: Formative Evaluation, Foreign Countries, Educational Technology, Educational Environment
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Hazari, Sunil – T.H.E. Journal, 1995
Reports on the installation of a local area network (LAN) at East Carolina University. Topics include designing the network; computer labs and electronic mail; Internet connectivity; LAN expenses; and recommendations on planning, equipment, administration, and training. A glossary of networking terms is also provided. (AEF)
Descriptors: Administration, Computer Networks, Computer System Design, Costs
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
Glenn, Terrence J.; Mechley, Victor P. – 1993
With respect to the college's information systems, there were three major challenges facing Ohio's Cincinnati Technical College (CTC) in 1991. The expanding use of personal computers (PC's) and non-integrated systems often duplicated efforts and data on CTC's existing computer systems, users were demanding more access to data and more integration…
Descriptors: Administrative Organization, College Planning, Community Colleges, Computer Literacy
Peer reviewed Peer reviewed
Coles, Elizabeth – Information Services and Use, 1991
Describes the implementation of BRS/Search in the Library and Information Services department of the Chem Systems Group, an international consulting organization in the United Kingdom. The use of integrated systems in special libraries is discussed, and requirements of the new system are explained, including full text capabilities and networking…
Descriptors: Chemical Industry, Computer Networks, Computer System Design, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy