NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 256 to 270 of 4,569 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Omidi Najafabadi, Maryam; Mirdamadi, Seyed Mehdi; Payandeh Najafabadi, Amir Teimour – International Journal on E-Learning, 2014
The facts that the wireless technologies (1) are more convenient; and (2) need less skill than desktop computers, play a crucial role to decrease digital gap in rural areas. This study employed the Bayesian Confirmatory Factor Analysis (CFA) to design a mobile training system in rural areas of Iran. It categorized challenges, potential, and…
Descriptors: Foreign Countries, Electronic Learning, Telecommunications, Computer Networks
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Manoff, Marlene – portal: Libraries and the Academy, 2013
Digital technology has irrevocably altered the nature of the archive. Drawing on materialist critiques and the evolving field of media archaeology, this essay explores new strategies for understanding the implications of computer networks in libraries. Although a significant portion of the contemporary literature within Library and Information…
Descriptors: Computer Networks, Libraries, Information Technology, Archives
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Sangpetch, Akkarit – ProQuest LLC, 2013
Large-scale enterprise applications are deployed as distributed applications. These applications consist of many inter-connected components with heterogeneous roles and complex dependencies. Each component typically consumes 5-15% of the server capacity. Deploying each component as a separate virtual machine (VM) allows us to consolidate the…
Descriptors: Computer Networks, Computer Oriented Programs, Reaction Time, Automation
Sukwong, Orathai – ProQuest LLC, 2013
Virtualization enables the ability to consolidate multiple servers on a single physical machine, increasing the infrastructure utilization. Maximizing the ratio of server virtual machines (VMs) to physical machines, namely the consolidation ratio, becomes an important goal toward infrastructure cost saving in a cloud. However, the consolidation…
Descriptors: Information Storage, Scheduling, Internet, Client Server Architecture
Peer reviewed Peer reviewed
Direct linkDirect link
Zhamanov, Azamat; Yoo, Seong-Moo; Sakhiyeva, Zhulduz; Zhaparov, Meirambek – International Journal of Information and Communication Technology Education, 2018
Students nowadays are hard to be motivated to study lessons with traditional teaching methods. Computers, smartphones, tablets and other smart devices disturb students' attentions. Nevertheless, those smart devices can be used as auxiliary tools of modern teaching methods. In this article, the authors review two popular modern teaching methods:…
Descriptors: Program Implementation, Program Evaluation, Blended Learning, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Verdú, Elena; Regueras, Luisa M.; Gal, Eran; de Castro, Juan P.; Verdú, María J.; Kohen-Vacs, Dan – Educational Technology Research and Development, 2017
INTUITEL is a research project aiming to offer a personalized learning environment. The INTUITEL approach includes an Intelligent Tutoring System that gives students recommendations and feedback about what the best learning path is for them according to their profile, learning progress, context and environmental influences. INTUITEL combines…
Descriptors: Technology Integration, Intelligent Tutoring Systems, Computer Networks, Computer System Design
Pages: 1  |  ...  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  ...  |  305