NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Alberta Education, 2006
This literature review is intended to provide practical information; lessons learned and promising practices which have been drawn from recent Kindergarten to Grade 12 (K-12) one-to-one mobile computing research reports and related articles. The information is presented in the form of answers to the following questions: (1) How is one-to-one…
Descriptors: Technical Support, Long Range Planning, Holistic Approach, Computer Software
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers