NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Boyce, Stephen – ProQuest LLC, 2021
The world continues to be plagued by cyber incidents that impact businesses, schools, hospitals, and government institutions. Some organizations have given cybersecurity a line item on the annual budget, while others have created dedicated departments to improve their technical defenses. Executive boards and C-level executives have shifted from an…
Descriptors: Demography, Decision Making, Computer Security, Undergraduate Students
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection
Peer reviewed Peer reviewed
Wen, H. Joseph; Yen, David C.; Lin, Binshan – Internet Research, 1998
Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)
Descriptors: Computer Security, Computer Selection, Computer Software, Corporations
Hall, Don; Kelly, Pat – Learning & Leading with Technology, 2005
Increasingly, teachers rely on computer software and networks to both enhance curriculum management and provide engaging learning opportunities in instruction. New software is enabling more frequent formative assessments to better focus day-to-day lessons on the unique needs of individual learners. Administrators use increasingly complex data…
Descriptors: Database Management Systems, Computer Software, Academic Standards, Academic Achievement
Peer reviewed Peer reviewed
Gonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Peer reviewed Peer reviewed
Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Swan, James – Rural Libraries, 1996
Presents a four-phase plan for small libraries strategizing for automation: inventory and weeding, data conversion, implementation, and enhancements. Other topics include selecting a system, MARC records, compatibility, ease of use, industry standards, searching capabilities, support services, system security, screen displays, circulation modules,…
Descriptors: Computer Security, Computer Selection, Data Conversion, Library Automation
Vane-Tempest, Stewart – Information Management & Technology, 1995
Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…
Descriptors: Computer Security, Computer Selection, Computer System Design, Data
Miller, Kevin – TECHNOS, 1997
This article, written by a high school student, describes how he helped his school attain access to state-of-the-art technology and to the Internet. Topics include problems, security issues, teacher training, examples of student Internet projects, technical details of the school's computer system, and how the school encouraged this student's…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Selection, Computer System Design
Race, Phil; McDowell, Steve – 1996
This how-to manual is intended to ease the transition to the information technology age even for those teachers who have no previous knowledge or experience with computers. Written in a concise, numbered paragraph format, the text uses simple nontechnical language. The first chapter titled, "Getting Started with Computers," covers choosing and…
Descriptors: Computer Anxiety, Computer Assisted Instruction, Computer Literacy, Computer Peripherals