Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Computers in Libraries | 4 |
Campus Technology | 1 |
Computing Teacher | 1 |
Internet Research | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Online Libraries and… | 1 |
Author
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 8 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role

Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Machovec, George S. – Online Libraries and Microcomputers, 1997
Describes thin clients, a networking technology that allows organizations to provide software applications over networked workstations connected to a central server. Topics include corporate settings; major advantages, including cost effectiveness and increased computer security; problems; and possible applications for large public and academic…
Descriptors: Academic Libraries, Computer Security, Computer Software, Corporations
Sylvia, Margaret – Computers in Libraries, 1995
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Descriptors: Computer Networks, Computer Security, Evaluation Criteria, Library Automation
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services
Daly, Kevin F. – Computing Teacher, 1994
This second in a series of articles on planning for instructional computer networks focuses on site preparation, installation, service, and support. Highlights include an implementation schedule; classroom and computer lab layouts; electrical power needs; workstations; network cable; telephones; furniture; climate control; and security. (LRW)
Descriptors: Classroom Design, Classroom Furniture, Climate Control, Computer Assisted Instruction