Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 20 |
Descriptor
Computer Networks | 65 |
Computer Software | 65 |
Computer System Design | 65 |
Higher Education | 18 |
Information Technology | 15 |
Microcomputers | 13 |
Information Networks | 12 |
Electronic Mail | 11 |
Telecommunications | 10 |
Foreign Countries | 9 |
Databases | 8 |
More ▼ |
Source
Author
Price-Wilkin, John | 2 |
Algermissen, Virginia | 1 |
Allan, John | 1 |
Arms, William Y | 1 |
Audino, Nancy | 1 |
Aust, Ronald | 1 |
Bauer, Michael A. | 1 |
Behrens, John T. | 1 |
Borbely, Jack | 1 |
Breeding, Marshall | 1 |
Brown, Stephen | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 9 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Audience
Practitioners | 4 |
Administrators | 1 |
Teachers | 1 |
Location
Spain | 2 |
Bangladesh | 1 |
Canada | 1 |
Maryland | 1 |
North Dakota | 1 |
United Kingdom (England) | 1 |
United Kingdom (Northern… | 1 |
United States | 1 |
Virginia | 1 |
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Verdú, Elena; Regueras, Luisa M.; Gal, Eran; de Castro, Juan P.; Verdú, María J.; Kohen-Vacs, Dan – Educational Technology Research and Development, 2017
INTUITEL is a research project aiming to offer a personalized learning environment. The INTUITEL approach includes an Intelligent Tutoring System that gives students recommendations and feedback about what the best learning path is for them according to their profile, learning progress, context and environmental influences. INTUITEL combines…
Descriptors: Technology Integration, Intelligent Tutoring Systems, Computer Networks, Computer System Design
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Dong, Hui – ProQuest LLC, 2010
In current Peer-to-Peer networks, distributed and semantic free indexing is widely used by systems adopting "Distributed Hash Table" ("DHT") mechanisms. Although such systems typically solve a. user query rather fast in a deterministic way, they only support a very narrow search scheme, namely the exact hash key match. Furthermore, DHT systems put…
Descriptors: Indexing, Online Searching, Search Strategies, Computer Networks
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Smith, Marissa L.; Cline, Mark A. – Journal of Science Education and Technology, 2011
Radford University was recently configured with a campus-wide wireless local area network. Using these new capabilities, a classroom-based Honors section of Concepts of Biology was conducted solely using electronic technologies (paper was never transferred from professor to student). To accomplish this, students used common software and freeware.…
Descriptors: Biology, Instructional Effectiveness, Computer Software, Educational Technology
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Derringer, Pam – Technology & Learning, 2009
Despite the last few years' growth in awareness of open-source software in schools and the potential savings it represents, its widespread adoption is still hampered. Randy Orwin, technology director of the Bainbridge Island School District in Washington State and a strong open-source advocate, cautions that installing an open-source…
Descriptors: School Districts, Barriers, Costs, Educational Trends
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers