NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 318 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Archer, Elizabeth; Barnes, Glen – International Review of Research in Open and Distributed Learning, 2017
During this age of data proliferation, heavy reliance is placed on data visualisation to support users in making sense of vast quantities of information. Informational Dashboards have become the must have accoutrement for Higher Education institutions with various stakeholders jostling for development priority. Due to the time pressure and user…
Descriptors: Computer Networks, Data, Visual Aids, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Laukens, Kris; Eyckmans, Marleen; De Neuter, Nicolas; Naulaerts, Stefan; Meysman, Pieter; Van Ostade, Xaveer – Journal of Biological Education, 2021
While computational biology and bioinformatics became an inherent part of most life science degrees, it remains challenging to encourage students to employ these diverse skills in a practical research context. In this education paper, we present a method to enable students to acquire hands-on skills by the data-driven study of complex biomolecular…
Descriptors: Data Analysis, Communicable Diseases, Molecular Biology, Science Instruction
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Alomari, Firas – ProQuest LLC, 2013
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
Descriptors: Information Security, Information Systems, Databases, Models
Wu, Jiang – ProQuest LLC, 2011
A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…
Descriptors: Databases, Computer Networks, Performance, Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wen-Chen; Chen, Ching-Wen; Weng, Richard – International Journal of Distance Education Technologies, 2015
In the conventional classroom, many obstacles hinder interaction between an instructor and students, such as limited class hours, fixed seating, and inadequate time for meetings after class. This work develops a novel multimedia mobile classroom feedback system (MMCFS) that instantly displays students' responses, such as class-related questions or…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Interaction
Peer reviewed Peer reviewed
Direct linkDirect link
Foley, Marianne – Journal of Electronic Resources Librarianship, 2012
The absence of a well-defined space for library resources within course-management systems has been well documented in library literature. Academic libraries have sought to remedy this deficiency in numerous ways. This article describes how a "library nugget," or module, was added to the Buffalo State College course-management system,…
Descriptors: Academic Libraries, Management Systems, State Colleges, Library Services
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Besser, Howard – Database, 1995
Outlines some of the major considerations in developing an image database system with an emphasis on continuous tone images and network-accessible multiuser databases. Topics include: definition/description of a digital image; matching technology to use; documentation/standards; access; image quality; software systems; scanners; and sources of…
Descriptors: Computer Networks, Computer Software, Database Design, Databases
Peer reviewed Peer reviewed
Feustle, Joseph A. Jr. – Hispania, 1988
Surveys some of the traditional and nontraditional electronic sources of information that can be of use in research and teaching. The discussion includes information about: 1) cost; 2) ease of use; 3) the earliest bibliographic entries; and 4) the frequency of updates. (Author/LMO)
Descriptors: Computer Networks, Database Producers, Databases, Information Technology
Tedford, Jennifer – Principal Leadership, 2008
How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best…
Descriptors: Lesson Plans, Course Content, Norms, Educational Technology
Janssens, D.; Jesse, A. – 1989
This document contains a compilation of overhead projection sheets from an International Labour Office (ILO) Training Course in Micro-ISIS held in March 1988, augmented by explanatory text and applications to a wide variety of databases. It is designed both to provide a visual, didactic approach to Micro-ISIS, and to constitute a quick-reference…
Descriptors: Bibliographic Databases, Computer Networks, Data Processing, Databases
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Millea, Megan – 1996
Silverplatter's Electronic Reference Library (ERL) provides wide area network access to its databases using TCP/IP communications and client-server architecture. ERL has two main components: The ERL clients (retrieval interface) and the ERL server (search engines). ERL clients provide patrons with seamless access to multiple databases on multiple…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Software
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  22