Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Storage Devices | 14 |
Data | 14 |
Information Storage | 9 |
Information Technology | 6 |
Computers | 5 |
Computer Science | 3 |
Computer Security | 3 |
Computer System Design | 3 |
Data Processing | 3 |
Databases | 3 |
Information Processing | 3 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 7 |
Dissertations/Theses -… | 2 |
Book/Product Reviews | 1 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Altiparmak, Nihat – ProQuest LLC, 2013
Massive amount of data is generated everyday through sensors, Internet transactions, social networks, video, and all other digital sources available. Many organizations store this data to enable breakthrough discoveries and innovation in science, engineering, medicine, and commerce. Such massive scale of data poses new research problems called big…
Descriptors: Information Storage, Data, Computer Storage Devices, Information Retrieval
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Boja, Catalin – Journal of Applied Quantitative Methods, 2006
There are described methods used to minimize data files dimension. There are defined indicators for measuring size of files and databases. The storage optimization process is based on selecting from a multitude of data storage models the one that satisfies the propose problem objective, maximization or minimization of the optimum criterion that is…
Descriptors: Databases, Data, Information Science, Information Storage
Redman, Thomas C. – EDUCAUSE Review, 2004
This document discusses the importance of data-quality and presents three simple steps that can help lay the framework for an over all data-quality strategy. The first step is to ask some rather simple questions, such as: (1) How much data does the organization have, how fast is it creating new data, and how many redundant copies are there?; and…
Descriptors: Computer Storage Devices, Computers, Data, Quality Control
Smith, Russell – MultiMedia Schools, 1996
Discusses the need to back up computer files, and describes the technological evolution of back-up methods. Reviews tape drive and external hard drive back-up products offered by computer companies and presents back-up strategies to use with all back-up methods. A sidebar lists information on the reviewed products. (JMV)
Descriptors: Computer Peripherals, Computer Storage Devices, Data, Magnetic Tapes
Goldsborough, Reid – Black Issues in Higher Education, 2004
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Descriptors: Computer Security, Computer Storage Devices, Computers, Internet
Higginbotham, Barbara – Primary Science Review, 2003
In this article, the author shares some notes from her own experience of supporting and delivering many hands-on datalogging workshops and using a variety of datalogging systems. She hopes they will be useful to those with less experience. She has broken down the notes into two main areas: the practicalities and learning about datalogging.…
Descriptors: Workshops, Information Technology, Science Instruction, Science Education
Bigelow, Richard Henry – 1973
A bulk data input processor which is available for the Rapidly Extensible Language (REL) English versions is described. In REL English versions, statements that declare names of data items and their interrelationships normally are lines from a terminal or cards in a batch input stream. These statements provide a convenient means of declaring some…
Descriptors: Computer Science, Computer Storage Devices, Computers, Data
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Levine, Paula Naomi – 1969
This thesis describes the requirements for a buffer storage device, with respect to other system components and its own limitations, which is designed to aid in the economic transmission of processed data from a central computer to distant terminals. Proceeding from the fact that tariff rates on wide band educational television channels are…
Descriptors: Communications, Computer Assisted Instruction, Computer Science, Computer Storage Devices
Association for Computing Machinery, New York, NY. – 1975
The papers and discussions of the 1975 Pacific Region meeting of the Association for Computing Machinery are presented. Topics included (1) the current and emerging state of the art in data management software and hardware, (2) relational systems with particular attention to new developments in systems for relational data bases, (3) advances in…
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers